* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Final Thesis - University of South Australia
Survey
Document related concepts
Deep packet inspection wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Distributed firewall wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Peer-to-peer wikipedia , lookup
Transcript
ant FINAL THESIS The Impact of OSPF Routing on Military MANETs By Rocco Mark Lupoi Supervised By Dr Grant Wigley Abstract This paper establishes the costs and impact that OSPF Routing has on Military style MANETs for use in the field. The research includes the simulation, recording and analysis of military MANETs to determine the impact an ‘off the shelf’ routing algorithm such as OSPF has on such a mobile ad hoc network similar to that in use in the field. Page i Declaration I declare that this thesis does not contain, without prior acknowledgement or permission, any material(s) submitted for a degree of diploma within the University. To the best of my knowledge, all material previously published or written by the author has been cited by the correct author(s). Rocco Mark Lupoi December 2015 Page ii Acknowledgements I would like to thank Dr Grant Wigley and the DST Group for giving me the opportunity to undertake this research and giving me the motivation to continue my research through the application of a PhD at the University of South Australia. I would also like to thank the University for giving me the opportunity to research and undertake this minor thesis through my bachelor of Computer Science. In particular from the University I would like to thank Dr Grant Wigley and Dr Stewart Von Itzstein. I would also like to thank Mr Tom Schar and Mr Peter Boyd for providing the support and the opportunity from the Australia Defence Science and Technology Group for this particular research. Page iii Table of Contents Chapter 1 – Introduction......................................................................................................................... 1 1.1 Statement of Research .............................................................................................................. 1 1.2 Field of Thesis ............................................................................................................................ 3 1.3 Significance and Contributions .................................................................................................. 3 1.4 Outline of Thesis ........................................................................................................................ 4 Chapter 2 – Literature Review ................................................................................................................ 5 2.1 Concept of Military Structure ....................................................................................................... 5 2.1.1 Military Structure ................................................................................................................... 5 2.2 Network Fundamentals................................................................................................................. 8 2.2.1 What is a Protocol? ................................................................................................................ 8 2.2.2 7 Layer OSI Model .................................................................................................................. 9 2.2.3 Layer 2 – Data Link Layer ....................................................................................................... 9 2.2.4 Layer 3 – Network Layer ........................................................................................................ 9 2.3 Concept of Ad Hoc Networks and Mobile Ad Hoc Networks...................................................... 11 2.3.1 Structured Networks ............................................................................................................ 11 2.3.2 Limitations of Structured Networks ..................................................................................... 11 2.3.3 What is Ad Hoc Networking? ............................................................................................... 12 2.3.4 Mobile Ad Hoc Networks and Routing................................................................................. 14 2.4 Network Routing and Routing Protocols/Algorithms ................................................................. 19 2.4.1 What is a Router?................................................................................................................. 19 2.4.2 What is OSPF? ...................................................................................................................... 20 2.4.3 MANET Routing Protocols .................................................................................................... 22 2.4.4 Routing Overheads............................................................................................................... 26 2.4.4.1 Routing Overheads – Metrics ........................................................................................... 26 2.4.4.2 Routing Overheads – Influences ....................................................................................... 27 2.4.5 OSPF on Ad Hoc Networks/MANETs .................................................................................... 28 2.5 Battlefield Variables and Limitations of Communications.......................................................... 31 2.5.1 Limited Bandwidth and Latency........................................................................................... 31 2.5.2 Intermittent Communication Links ...................................................................................... 31 2.5.3 Hidden Nodes....................................................................................................................... 31 2.6 Network Simulation Tools ........................................................................................................... 33 2.6.1 What is a Network Simulation Tool? ................................................................................... 33 2.6.2 Network Simulator 2 and 3 .................................................................................................. 35 2.6.3 OPNET Simulator .................................................................................................................. 35 Page iv 2.7 Conclusion ................................................................................................................................... 37 Chapter 3 – Methodology ..................................................................................................................... 39 3.1 Commonly used Methodologies in Research ............................................................................. 40 3.2 Research Strategy - System......................................................................................................... 43 3.3 Research Validation - Evaluation ................................................................................................ 45 3.4 Research Method to Use ............................................................................................................ 47 3.4.1 Network Behaviour .............................................................................................................. 47 3.4.2 Full System Implementation ................................................................................................ 47 3.4.3 Full System Simulation ......................................................................................................... 48 3.5 Network Simulation Tools ........................................................................................................... 50 3.6 Summary ..................................................................................................................................... 51 Chapter 4 – Simulation Design .............................................................................................................. 52 4.1 Military Structure ........................................................................................................................ 53 4.1.1 Military Symbols................................................................................................................... 54 4.2 Network Topologies .................................................................................................................... 59 4.2.1 Structured Topologies .......................................................................................................... 59 4.2.2 Dynamic Topologies and the Limitations of Structure......................................................... 61 4.2.3 OSPF and Network Structure ............................................................................................... 61 4.3 Representation of Military Structure as a Network Topology/Scenarios ................................... 64 4.3.1 Requirements Provided ....................................................................................................... 64 4.3.2 Defining Military Organization ............................................................................................. 64 4.3.3 Converting to Network Topologies ...................................................................................... 71 4.3.4 Developing Network Cases .................................................................................................. 75 4.4 Determine Inputs for the System................................................................................................ 76 4.5 Determine Outputs (metrics) for the System ............................................................................. 77 4.5.1 IP Forwarding Tables ............................................................................................................ 77 4.5.2 OSPF Traffic .......................................................................................................................... 77 4.5.3 Point to Point Throughput ................................................................................................... 78 4.6 Summary ..................................................................................................................................... 79 Chapter 5 – Simulations ........................................................................................................................ 80 5.1 Simulation Phases ....................................................................................................................... 81 5.1.1 Phase 2 ................................................................................................................................. 82 5.1.2 Phase 3 ................................................................................................................................. 89 5.2 Simulation Results ....................................................................................................................... 95 5.2.1 Phase 2 ................................................................................................................................. 95 5.2.2 Phase 3 ............................................................................................................................... 117 Page v 5.3 Summary of Simulation Results ................................................................................................ 138 Chapter 6 – Conclusions and Future Work ......................................................................................... 140 6.1 Future Work .............................................................................................................................. 142 6.2 Thesis Contribution ................................................................................................................... 143 References .......................................................................................................................................... 145 Page vi Chapter 1 – Introduction The following section will give a synopsis of the purpose of the research on MANETS, what aspects this paper will address, and what will be contributed within the research. 1.1 Statement of Research The research proposed in this paper will focus on Mobile Ad Hoc Networks (MANETs) and the routing overheads of the Open Shortest Path (OSPF) routing algorithm for military use MANETs. MANETs are an infrastructure-less based networking model that is created purely with end user devices, rather than using any form of fixed infrastructure or networking devices. Essentially, a MANET puts the work of creating and maintaining a network in the hand of end devices rather than dedicated networking equipment such as routers and/or switches. Routing overheads refer to the amount of networking resources that are required to upkeep the routing of data throughout a network. Routing overheads are one of the most prevalent concerns when it comes to MANETs, as limited resources, low bandwidth devices, power limitations, energy limitations and the dynamic nature of MANETs will further increase the overhead of routing on such a network, resulting in a further consumption of networking resources by the routing protocol. These limitations are even more prevalent on military MANETs, where harsher environmental variables, larger network/node sizes, and a limitation on device infrastructure create a further drawback for routing overheads. The applications for MANETs are most optimal when creating infrastructure for a network is either impossible due to environmental or cost limitations. MANETs also have the advantage of removing a single point of failure of the network, as they are non-administered. This means that the network is self-configuring and self-maintained, and thus will not break down as a network that is administered by a particular device would. This thesis is intended towards the research of military MANETs for the DST Group (Defence, Science and Technology Group). The utilization of routing protocols on a MANET poses one of the most prevalent issues when trying to establish a MANET. As stated earlier, routing overheads are the major concern with routing within a MANET environment. The core influence for routing overheads is the routing protocol itself. This is due to the protocols themselves holding the policies and algorithms used to determine the route each data packet should travel on the network. Routing algorithms that are designed for use on conventional structured networks are not usually considered in a MANET environment, let alone a military MANET environment with further limitations. This is due to factors of the way the routing protocols themselves function internally. These conventional routing protocols were not designed for use on MANETs. That being said, there are plenty of advantages for utilizing such a routing protocol on a MANET, key of which is the non-specialized and well known nature of said routing protocols. The research will focus on one conventional routing algorithm in particular as requested by the DST Group for evaluation on MANETs. The routing protocol in question is Open Shortest Path First (OSPF). The research will undertake evaluation of the OSPF routing protocol, which will be performed through a series of simulations to reveal routing overheads of the routing protocol setup in a MANET environment. Page 2 1.2 Field of Thesis Ad Hoc Networking, Networking, Routing Protocols, Military Networks, Mobile Ad Hoc Networks, Network Simulation Tools. 1.3 Significance and Contributions The following section will outline the contributions, which will be made in this thesis. - OSPF in a military MANET situation is unlikely to be viable with the mobility model. (Chapter 5) - With a low number of nodes (less than 5 soldiers), the use of RIP and/or OSPF might be a viable routing solution on a military MANET. (Chapter 5) - OPNET Network Simulation model for military MANETs. (Chapter 4) - Expansion of the understanding of use of MANETS within the hierarchical structure of the Military and the use of the MANETS within this structure. (Chapter 4) - Expand the understanding of the limitations of the OSPF routing algorithm. (Chapter 6) Page 3 1.4 Outline of Thesis The following section will provide an outline of each of the chapters presented in the thesis. Chapter 1 - The thesis will be introduced, giving a brief overview of the expectations of the following research, as well as the Field of Thesis and the Significance and Contributions. The context for the research will be established and its purpose discussed. Chapter 2 - This chapter will commence the literature review. This section introduces the theoretical framework adopted for this study and reviews the literature associated with the research. Chapter 3 - This chapter will cover the gaps found in the literature in Chapter 2, and develop a research question for the thesis. The methodological approach to the research question will then be developed and explained. Chapter 4 - This chapter will cover first phase of the methodology as explained in the Chapter 3. This is the first stage in developing a system to help answer the research question. This section begins by detailing the theory required prior to designing the system to answer the research question. Chapter 5 - This chapter includes the development of the system and the gathering/evaluating of results. This section focuses on the results and analysis of the study. Chapter 6 - This chapter will conclude the research by giving a final word on the results as gathered and analysed in Chapter 5. This section will also go into detail of any future works that have been developed from the conclusion of the research. Page 4 Chapter 2 – Literature Review The following section will commence the literature review of the research. This section will go into building up information on military structure, networking, ad hoc networking, mobile ad hoc networking, routing overheads, as well as networking simulation tools. All information presented in this section is based upon research found in research papers, journals, conference papers, lectures and presentations. 2.1 Concept of Military Structure Like any team based organisation or group, the military adheres to a structure that helps define rankings of power, positioning of people, as well as task separation and allocation of those people. There are many proven key advantages to the utilization of team-based structures in solving problems. [1] Some of these include the ability to capitalize on team member’s strengths and minimize their weaknesses. A team structure allows the coverage for all activities depending on the member’s abilities. [2] When this structure is adhered to, it creates a strong force that can capitalize on members to ensure there are less management, improved relationships, increased productivity and a good balance to both the people and the task at hand. [1] The following section will briefly explain why the military have such a structured team system. From this, research will also be undertaken into the variables and limitations one can combat in a battlefield regarding environmental and technological constraints. 2.1.1 Military Structure The most basic and important resource of the Army is its soldiers. In carrying out the mission of defending a nation, people in the Army, both soldiers and officers must work closely as a team to execute complex tasks under difficult and dangerous conditions. There are three critical components to the succession of military organization. These include: [2] A system of rank reflecting a person’s responsibilities and experience. Page 5 An organizational structure in which people know their responsibilities. Military courtesies, customs, and traditions that serve to bond military professionals together. It is important to note that there are two major components that we will be focusing in the scope of this research. They include Army Rank and Army Unit Structure. Both of these components are vital to the understanding of the military organization and reveal how the main focus of this research will be approached. It is important to understand these key pieces of information, as this is the defining structure upon a system needs to be built. 2.1.1.1 Army Rank Army rank and military rank is what binds all military personnel together as a team. In the army, this relationship is known as the ‘chain of command’. Army rank identifies who is in charge. This defines whom to look for orders, guidance, and leadership. This ranking works on the hierarchical chain of command, with the most important leadership roles sitting at the top of this chain. At this stage it is important to note that the ranking is hierarchical works via a chain of command. More detail on the ranking and the workings internal to the military we will be focusing on will be fleshed out further into the research. [2] 2.1.1.2 Army Unit Structure In an Army Unit structure (also referred to as a ‘Cadet’ command structure), the work of the overall team is carried out in both smaller and larger organisations. The most significant of these are the squad, platoon, company and battalion. These smaller organisations are ranked in the same respect as the Army Rank previously described. The types of people that work in these smaller organisations are grouped according to rank and their job. [2] For example, there may be a dedicated quad of snipers. It is also important at this point to note that these smaller organisations are also ranked in a hierarchical order or chain of command in the same way that soldiers and officers are ranked. In this Page 6 respect we have a group of people working in groups at levels up the chain of command in a structured and hierarchical manner towards the top of the chain; similarly to how most enterprises and organisations function. More detail on the army unit structure and the internals to each of the organizations and where they sit on the hierarchical chain of command will be further fleshed out further into the research. Page 7 2.2 Network Fundamentals This section will introduce the basics of networking and routing. The main focuses of this section include the 7-layer OSI model, routing and common routing protocols/the basic operation and workings of a routing protocol. A network can be defined as a group of devices that are connected together to share and transfer data along either a physical medium, or wireless connections. When networks become increasingly complex with the utilization of more devices and other more complex requirements, it is essential to have other devices on that network to maintain the connections between the devices that require communication on the network. These devices are known as ‘network devices’ and can include routers, switches, wireless gateways, network interface cards and wireless cards. Devices that are typically used within a network include client computers, servers, phones, tablets, and other networking equipment. 2.2.1 What is a Protocol? A protocol (in networking terms) is a set of rules that governs the communications between computers (and/or devices) on a network. In order for two devices to communicate with each other, they must be speaking the same ‘language’. Many different types of network protocols and standards are required to ensure that the device (no matter what operating system, networking interface card, or application being used) can communicate with other devices on the same network. [7] Protocols are generally expressed through packets. Packets are essentially protocols that can handle data. An example of this is the Transmission Control Protocol (TCP) that sits at Layer 4 of the OSI model (the Transport Layer). The TCP is used for sending reliable data over the Internet. This is achieved by using a checksum to ensure the data is contained within the packet, to ensure that the data is accurate and reliable. The User Datagram Protocol (UDP) on the other hand, is used in a similar manner to the TCP, but due to its lesser complexity, it is more speedy and efficient, but has its fall-backs in reliability and accuracy. Protocols are usually used within packets, which are a unit of containing overheads/relevant packet information and encapsulated data. Page 8 2.2.2 7 Layer OSI Model A reference model is a conceptual blueprint of how communication should take place. It addresses all of the processes required for effective communication and divides these processes into logical grouping called layers. A communication system that is designed in this way is known as a layered architecture. In networking, the basics of protocols, packets and lower level communication can be expressed through the developed Open System Connection (OSI) model. [6] The OSI model is comprised of seven different layers, each layer having its own responsibility. The OSI model includes the Application, Presentation, Session, Transport, Network, Data Link and Physical layers. Each of these layers is grouped by a protocol data unit (PDU). The PDU represents what network protocols each layer focuses on (this will be covered in Section 2.2.2). The protocols include Data (Found at the Application, Presentation and Session layers), Segments (Transport), Datagram (Network), Frame (Data Link) and Bit (Physical). For the sake of relevance of this research we will only be focusing on Level 3 and Level 2 of the OSI Model (respectively Network [L2] and Data Link [L3]). 2.2.3 Layer 2 – Data Link Layer The Data Link Layer functions in a similar way to the Network Layer (section 2.2.4). The key difference is it responsible with Media Access Control (MAC) between nodes. MAC includes error corrections and acknowledgements within the physical layer as well as delivery of frames within a local network. The Data Link Layer is typically sub layered between the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. [6] 2.2.4 Layer 3 – Network Layer The network layer is used for mainly routing, normally using routers. The layer is critical towards end-to-end connectivity of devices. This is due to the fact that this layer maintains source and destination between hosts within a network. It also maintains segmentation of networks and sub networks. [6] Page 9 As routing occurs at this layer (Network Layer), this research will focus on the protocols that operate within the Network Layer. Standardized Network Layer protocols are typically used in structured, enterprise networks and is uncommon with military use, especially within mobile ad-hoc networks (MANETS). However, for the purpose of this research, it is important to acknowledge such protocols and reason with their suitability/unsuitability within MANETS. This will be further fleshed out later on in the research. Page 10 2.3 Concept of Ad Hoc Networks and Mobile Ad Hoc Networks The previous sections have outlined the basics of military structure, the purpose of such structure, as well as the basics of networking and the purposes of the network layer protocol. This section will further expand on ad-hoc network infrastructure, and why a structured network may not be suitable within a military. 2.3.1 Structured Networks A structured networking infrastructure is a fixed, predictable network topology, which uses specialised devices (such as routers) to maintain communications. Each of the networks that have been explained within the previous sections are examples of structured networks. There is a key difference that separates structured networks from unstructured networks. That key difference is in the respect that structured network topologies change a lot less frequently in comparison to unstructured networks. Network topologies usually change for a structured network due to environmental issues outside of the control of network administrators (ie. An electrical storm causing a power outage), a change of configuration due to a restructure, or possibly the addition of new hardware. The change of network topologies can be very costly, as information of the topology change must be between routing nodes within the network. Structured networks are also very organised (as one would assume with the name). Typically within a structured network, special devices are required to perform specialised tasks. Typical structured enterprise networks utilise the core, distribution and access layer. The core layer utilizes Layer 3 Networking/Routing and acts as the backbone for the while network. The distribution layer utilizes both Layer 3 Networking and Layer 2 Switching, depending on the size of the distribution layer. The access layer is purely for switching and brings connectivity for end devices. 2.3.2 Limitations of Structured Networks There are many advantages to the utilization of structured networks. There is a reason that most enterprise and standard networks are based around the ideas and concepts of structured network Page 11 topologies. They are very reliable for their intended purpose (usually within an office/home/enterprise application). This section will go into explaining some of the key limitations when it comes to structured networks, with the later sections also going into further detail as to why structured network topologies may not be the best solution in the context of military ad hoc networks. One of the key disadvantages of the use of structured networks comes in the lack of flexibility for nodes to connect to any part of the network. This comes as a major disadvantage to the flexibility that MANETs offer in comparison to the structured nature of enterprise networks. As previously described, the typical core, distribution, access layer only allows access to a network through an access layer. In some situations it is required to have access throughout the whole network. As shown in [8], the article describes a MANET that allows the flexibility of devices to connect simultaneously on the network, with dropouts handled by the flexibility of the reconfiguration of the network on-the-fly. Another major disadvantage of structured networks is that they have a central network administration to oversee and maintain the network as required. This is configured by network administrators, which required a constant maintenance and repair to ensure the network is up kept and reliable. Lastly, structured network topologies have typically very high/expensive routing costs. This is usually due to the sheer amount of devices on such networks, but also has a factor with the actual routing technologies that are utilized at the Network Layer for routing purposes. The more devices on the network will typically require more specialised network devices and more layered/structured routing configurations. 2.3.3 What is Ad Hoc Networking? Simply put, an ad hoc network is a network formed without any central administration, which consists of mobile nodes that use a wireless interface to send packet data. Since the nodes in a Page 12 network of this kind can serve as routers and hosts, they can forward packets on behalf of other nodes and run user applications. [9] Ad hoc networking provides a natural self-healing, selfconfigurable network ecosystem, which requires little maintenance. This is due to ad hoc networking protocols being structured around each node being its own router and is ware of every other node on the network. This key concept of each device essentially being a ‘router’ allows the connectivity of nodes at any point throughout the network, giving the flexibility of mobility. 2.3.3.1 Problems with Ad Hoc Networking While the concepts and the advantages of ad hoc networking seem almost too good to be true, there are always some key disadvantages that need to be explained before carrying on with the research. Due to the rapid nature of ad hoc networks in comparison to structured networks, it is very difficult to find/use a networking routing protocol. All of the current known and developed network routing protocols have been developed for the use in structured networks. For that reason it must be taken into consideration that it will be difficult to adapt said protocols for the use in MANETs. For example, one of the most common routing protocols which is the focus of this research (Open Shortest Path First [OSPF]) relies upon flooding packets within the network to maintain a consistent topology for all routers within the network. While this flooding is normally seen as a very low cost and fast update in wired networks, it is a different story without the reliability of wired links. Error rates on wireless links are increased, speed and throughput is decreased and bottlenecks are introduced with the device capabilities transmitting said wireless signals. As OSPF is very rapid with its updates, there may be nodes dropping/needing to be re-added to the topology due to a packet flood not making its way to some nodes. OSPF also relies of neighbour adjacencies (nearby nodes), which within an ad hoc network can be forever changing as mobile nodes move around a lot. There will be more information on OSPF on MANETs in Section 2.4.4. Page 13 2.3.4 Mobile Ad Hoc Networks and Routing Thus far, the concepts of ad hoc networking have been introduced as well as key disadvantages with both structured networks and ad hoc networks. This section will delve further into the implementation of ad-hoc networking in the mobile realm known as mobile ad hoc networking (MANET). A MANET is a type of ad hoc infrastructure that solely uses mobile devices to structure the network. 2.3.4.1 Common Applications and Uses of MANETS It is important to note that MANETs are not normally used in situations where infrastructure, structured networks are cheaper and easier to set up. It makes little to no sense to set up an ad hoc network in an office/enterprise environment where by the infrastructure is easily cabled/wired to suit those needs. MANETs are used where infrastructure cannot be utilised due to the environmental constraints associated with the location or application of the network. [10] A key example of this is on the field in a military situation as the focus of this research. Besides the scope of this research, there are many other examples of a MANET in the field. Another example comes in the form emergency/rescue operations for disaster relief efforts (i.e. fire, flood, earth-quakes, etc). In this situation, emergency rescue operations must take place where non-existent or damaged communications infrastructures are and rapid deployment of a network is needed. MANETs are also beneficial in infrastructure-less scenarios, which may contain simple tasks and not require the overheads of a structured network. A good example of this includes the ability to quickly and easily set up a network for short-range intercommunication between various mobile devices (such as a PDA, a laptop, and a cellular phone). Tedious and un-necessary wired cables are replaced with wireless connections. 2.3.4.2 Military use of MANETS One of the major uses of MANETs is in the military application. The properties of MANETs that most suit the military come in the self-configuring properties and mobility of such a network design. The Page 14 environments upon which the military are normally situated in battlefield also have very bumpy terrain and environmental conditions which further prevent the use of static or structured networks with any formal infrastructure backings as the case would be in an office environment. Thus, the MANET takes the advantage here in the case of unforseen breakages and link redirection, the ease of setting up a network on the fly, as well as the scalability and flexibility of the network topology. [11] An example of this flexibility can be seen in the diagram below, where by the direct route (shown in red) of the moving traffic can take other routes to reach either node, even if the middle node where to loose connection. Figure 1 - Example of 'self-healing' of MANET [12] One of the military applications of MANETs includes the ‘pocket radio network’. This network has been designed to conduct a feasibility report on the usage of packet switched radio communications to provide reliable computer communications. The DARPA PACKET RADIO NETWORK, PRNET has evolved throughout the years (1973-1987) and has become a robust, reliable and operational Page 15 experimental network. The follow up to this program and evaluation is further benefitting from this research in making lower power, cheaper and smaller radio devices that provide an even better and more reliable performance in infrastructure-less environments. [13] 2.3.4.3 Advantages of MANETS There are a multitude of advantages that MANETs provide in comparison to infrastructure-based networks. One of the key advantages is that MANETs do not require any specific networking devices such as routers and/or switches to maintain a network. There is no need for a central medium to ensure that there is full connectivity, therefore allowing a very cheap initial set up cost for the network. [14] Another key advantage of MANETS is the ‘self-healing’ ability as described previously. The ability for routes to essentially never loose connection so long as there is at least one node connection to each other node allows a full mesh of devices. This full mesh acts as a complete routing map, as each of the devices act as their own router. When one node looses connection (drops off the network routing table), it’s link can be ‘healed’ by means of utilizing another connection to reach the destination node. This ability is done automatically and upkeeps the integrity and reliability of the network, even when nodes are lost. The initial setup costs of MANETs are also typically much lower than the counterpart of structured networks. This is mainly due to the lack of physical infrastructure of the network (i.e. cabling), as well as the lack of requirement for communication devices such as routers and switches. This lack of additional equipment leads directly into the next advantage that MANETs provide and that is very quick setup times and flexibility of the network setup. The speed upon which a MANET can be setup is also much lower than that of a structured network. This is due to the almost ‘automatic’ configuration of the network. There is a great separation from central network administration when using MANETs. This, paired with the ad hoc configuration of such a network, allows the network to be configured, filled up with devices and operational almost Page 16 instantly once the first node is operational. This flexibility of nodes connecting and moving around the network also dramatically benefits the use of MANETs in very mobile situations where-by devise may not necessarily stay in one defined location (both physically and topology defined). 2.3.4.4 Disadvantages of MANETS Whilst there are many key advantages to MANETs such as the high mobility of the model, the cost factors, as well as the ongoing costs, it is not without some downfalls. One of the biggest disadvantages of MANETs is the difficulty to implement Quality of Service (QoS). Due to the bandwidth constraint and the dynamic topology of MANETs, supporting QoS is a very challenging task. QoS is known as ‘a feature of routers and switches which prioritizes traffic so that more important traffic can pass first. The result is a performance improvement for critical network traffics’. As one can assume, QoS is a requirement when dealing with detrimental systems such as in military applications, thus a QoS model is desirable. Recently, because of the rising popularity of multimedia applications and potential commercial usage of MANETs, QoS support in MANETs has become an unavoidable task and point of research. Due to the scope of this paper we will not be reviewing the current approaches, but it is important to note that a lot of work has been done in supporting QoS across the Internet, but unfortunately none of them can be directly used in MANETs because of the bandwidth constraints and the dynamic network topology nature of MANETs. [15] Another key disadvantage of MANETs is the increase in application latency. [16] Due to the wireless nature of MANETs, latency is to be involved in some form or another. Latency is essentially ‘the amount of time it takes a packet to travel from source to destination. Together, latency and bandwidth define the speed and capacity of a network’. [17] We have already defined a MANET as being a usually low bandwidth network, with the included impact of high latency due to the wireless nature of the network, the capacity and speed of the network is also going to be fairly low (explained further below). The increase in this latency will have a direct impact on applications that are run on the network. This can have a bad impact depending on the application. A very common example of a Page 17 latency sensitive application is multimedia applications such as Voice Over IP (VOIP). This application requires low latency as the packets containing the voice audio data/possible video data needs to be forwarded with as minimal delay as possible to ensure fluid communication. Another key disadvantage with MANETs comes in the form of security. MANETs are generally more prone to physical security threats in comparison to a fixed, structured, hardwired network. There do exist entry-level security techniques in place (i.e. encryption) to reduce these threats. That being said, there is still an absence of link-level encryption at the network layer (Layer 3) within MANETs. [18] Within a MANET, there are multiple entry points into the network at every node. This makes the attempt to break into a MANET much easier and without the correct level of security throughout the network; MANETs can be a very exposed area for attackers. Lastly, there is the issue that stems the initiative of this research. That is the question on whether or not ad hoc networks can run standardised protocols on them that are usually used within an infrastructure network. The scope of this research focuses specifically on the use of routing protocols (OSPF) on a MANET. Page 18 2.4 Network Routing and Routing Protocols/Algorithms Routing, within the context of packet data networks focuses on utilizing the most efficient path of forwarding a packet within a network. Routing devices are typically what form the backbone of a network. They determine the structure of a network and have control over what packets go where throughout a network. Wide Area Networks (WANs) are a formation of multiple Local Area Networks (LANs). With the increasing amount of LANs within a WAN, it is important to use protocols that are suitable for the network to ensure reliability, redundancy, uptime and overall performance. Typical routing protocols include RIP, OSPF, EIGRP and BGP. A router uses a routing table to determine where to send packets. The routing table consists of a set of routes that describe which gateway or interface the router uses to reach a specified network. This table will initially only contain the addresses of directly connected networks. To communicate with other networks on the WAN, routers must be either specified in the table (by the means of static routing), or dynamically added to the routing table (via the means of a routing algorithm). The routing algorithms mentioned above are methods of dynamic routing algorithms/protocols. It is important to note at this point that dynamic routing protocols rely on the routing tables of each router. The routing table of each router contains vital information for a routing infrastructure. The information that is included within a routing table is participating networks, routing protocol used, source of networks, next hop and next hop metric. Each of these pieces of information are used by the router to determine the best path for packets to travel on the network. [19] Due to the relevance, the remainder of this section will focus on the Open Shortest Path First (OSPF) routing protocol. 2.4.1 What is a Router? It is important at this stage to define exactly what a router is and what its function is. As previously discussed, routing deals with network addresses, and thus the Network layer (Layer 3) of the OSI model. Page 19 A routers primary function is to forward packets between devices and networks. A router is simply a computer running code that determines how and where to forward packets bound for other networks/devices. The computer that deals with forwarding these packets may be a single purpose computer with a specialist operating system, or be simulated through a piece of software. [20] 2.4.2 What is OSPF? The Open Shortest Path First (OSPF) protocol is an Interior Gateway Routing Protocol (IGRP), based on Shortest Path First (SPF) or link-state technology. It utilizes SFP to route the most efficient destination of packets. [21] OSPF was designed specifically for the TCP/IP Internet environment, and supports the following features: Authentication of routing updates. Tagging of externally derived routes. Fast response to topology changes with low overhead. Load sharing over meshed links. OSPF also has other mechanisms that allow the network to run more efficiently. One of these mechanisms is OSPF’s ability to divide the network into ‘areas’. These areas allow the grouping of certain routers within a network. These areas can determine the logical and physical grouping of devices within a network. [22] For example, in an office environment, which includes a multitude of departments, it might be wise to group each of the departments into separate ‘areas’ on the network. 2.4.2.1 How does OSPF work There is some terminology that needs to be explained before going into detail of how the OSPF routing protocol works. Key terms that are required to know include: Router ID – In OSPF this is a unique 32bit number assigned to each router. Neighbour Routers – Two routers with a common link that can talk to each other. Page 20 Adjacency – A two-way relationship between two neighbours. LSA – Link State Advertisements are flooded; they describe routes within a given link. Hello Protocol – This is how routers on a network determine their neighbours and form LSAs. Area – A hierarchy. A set of routers that exchange LSAs with others in the same area. Areas limit LSAs and encourage aggregate routers. As previously mentioned, OSPF is a link-state routing protocol. Link state routing protocols can be though of as holding/generating a distributed map of the network. To get this information distributed, OSPF does three main things. First of all, when a router running OSPF is connected and enabled on a network, it will initially send hello packets to discover its neighbours on the network and elect a designated router (DR). These hello packets that are sent include link state information, as well as a list of neighbours. Providing information about the neighbour to that neighbour router serves as an ACK (Acknowledgement), and proves that the communication between the two routers is bi-directional. It is important to note that OSPF is smart about the Layer 2 network topology. If it sees a point-to-point link it will know that this is enough and the link is considered ‘up’. If there is a broadcast link, the router must wait for an election before deciding if the link is operational. Keeping in mind that a broadcast is a method of sending a signal where multiple parties may hear a single sender versus a point to point where a message is transmitted only from one device to another. [23] The election ballet can be stuffed, with a Priority ID, so that one can ensure the best route is the DR. Otherwise the largest IP address wins the DR. The key idea with DR and backup DR (BDR) is that they are the routes to generate LSAs, and they must do database exchanges with other routers in the subnet. Non-DRs form adjacencies with the DR. The whole DR/BDR concept is used to keep the OSPF protocol scalable. The only way to ensure that all routers have the same information is to make then synchronize their databases. If there were 21 routers, and want to bring another one up on the Page 21 network, then 21 new adjacencies would need to be formed. If the database is centralized, with a backup (just in case), then adding more becomes easy to manage a linear problem. [24] The database exchange between routers is part of bringing up adjacencies after the hello packets are exchanged. This stage is very important as if the databases are out of sync; there is a risk of routing loops and black holes in the network amongst other issues. The last part of bringing up an adjacent in the network is Reliable Flooding, or LSA exchange. [24] The full details of an LSA are not required for this research, but it is important to note the association with areas within the network. Areas were described previously, but one of the key pieces of information needed to know with OSPF is that Area 0 is a special area, and that if there are other areas on the network, they all need to ‘touch’ Area 0. Area 0 is known as the ‘Backbone Area’. There are different types of areas in OSPF, which can become very complex once Virtual Links and other techniques are added to ensure all areas within an OSPF network touch Area 0. The final notes that should be taken from an overall overview of OSPF is: [24] OSPF is a fast-converging, link-state IGP OSPF forms adjacencies with neighbours and shares information via the DR and BDR using Link State Advertisements. Areas in OSPF are used to limit LSAs and summarize routes. Everyone connects to area 0, the backbone area. 2.4.3 MANET Routing Protocols It is important at this point to note an overview of ad hoc routing principals and how they differ from conventional routing techniques as explained previously in the overview of OSPF. Some of the challenges with routing in an ad hoc environment, as well as an overview of the basic ad hoc routing techniques will be given in the following section. Page 22 2.4.3.1 Ad Hoc Routing Challenges There are many challenges faced when finding a routing protocol that will best suit an ad hoc network. Many ad hoc networks are designed in different ways using different devices and structures. While each network may be different in some respects, the underlying principals of ad hoc/mobile ad hoc networks remain the same, with each having similar or the same challenges. Some of these challenges include: [25] Dynamic Topologies – With network topologies of structured networks remaining the same or similar for extended periods of time, routing protocols for structured networks need not quick update times for when nodes change/structure of the network changes. This poses a challenge for ad hoc networks where nodes and structure of the network is constantly changing. Bandwidth-constrained, variable capacity links – Link speeds for ad hoc networks/MANETs rely solely on the types of devices and the environmental constraints of where the network is being set up. Certain environments and devices do not allow for the ranges of bandwidth and capacity that structured networks gain with wired links (i.e. Ethernet 100-1000Mbps versus Radio Link @ 2-5Kbps). This presents another large challenge in routing protocols having a low overhead so the bandwidth available is consumed by the applications required on the network (i.e. Radio/Video signals in a battlefield). Energy-constrained – Similar to a bandwidth constraint, energy constrains are posed on the devices themselves of how much processing power will be required for such routing protocols. Devices themselves (especially on a MANET) are not normally highly powerful, with most of the processing power of the devices going, again, into the applications that are required for use on the network, rather than the routing algorithm/protocol. This poses a challenge in the respect that the routing protocol cannot be highly processor intensive. Limited Physical security – As described earlier in the Chapter, physical security of ad hoc networks is very limited on the grounds that the connections are completely wireless and Page 23 advertised (for the most part). There are only a few precautionary measures that can be taken in regards to security, and unfortunately not at every level (as described in Section 2.3.4.4). Scalability – Lastly, scalability poses another great challenge for ad hoc network routing protocols. This is due to the fact that routing protocol processing and overhead seemingly gets greater as the network gets more complex. The limitations of the OSPF routing in regards to scalability were briefly explained in Section 2.4.2.1. The use of areas and other mechanisms such as DR and BDRs were how OSPF dealt with scalability and upkeep of reliability and performance. This poses a greater challenge for ad hoc routing protocols as there is even less room for such mechanisms with lower bandwidth and limitations on security and energy. 2.4.3.2 Proactive Routing Protocols Depending on when the route is computed, routing protocols can be split into two categories; precomputed (proactive) and on-demand (reactive) protocols. This section will describe precomputed/proactive routing principals. Precomputed routing is also referred to as table driven routing. [26] In this method, each of the routes to all destinations are computed in advanced. In order for this to happen, nodes of a network need to store the entire or partial link state information and network topology information. In order to keep this information up to date, nodes need to update their information periodically or when a link status or network topology has changed. This comes with its share of advantages and disadvantages. A key advantage of proactive routing protocols is that when a source needs to send packets to a destination, the route is already available; therefore there is no latency. The disadvantage to this approach is that some routes may never be used, provided there is always a better/cheaper/more efficient route available. Another key issue with this in respect to an ad hoc network is that the dissemination of routing information Page 24 will consume a lot of the scarce network resources when the network topology/link state status changes (this is even more apparent on a MANET). OSPF and other Link State Routing algorithms are examples of proactive routing techniques. [27] 2.4.3.3 On-Demand or Reactive Routing Protocols On-demand routing is also referred to as reactive routing. In this type of routing protocol, the route to a destination node may not yet exist in advanced, but be computed only when the route is needed. The method to this kind of routing protocol is as follows. When a source needs to send packets to a destination, in finds a route or several routes to the destination. This is called ‘route discovery’. After the routes are discovered, the source transmits the packets across the routes. During this transmission process, the packets may be broken as the nodes on the route may move or go down. Thus, the broken route needs to be rebuilt. The process of detecting a break in a route and rebuilding a path to the destination is referred to as ‘route maintenance’. [27] The major advantage of on-demand routing is the scarce network resources of ad hoc/mobile ad hoc networks is greatly saved as the amount of routing information exchanged in maintaining routes is only to and from those that are forwarding traffic. This kind of approach also removes the need to constantly update routing information across the network, or flooding the network every time a link state changes. The biggest fall-back of on-demand routing comes in the form of large latency at the beginning of the transmission caused by ‘route discovery’. [27] 2.4.3.4 Flooding Aside from Proactive and Reactive routing protocols, there is another routing mechanism referred to as flooding. Flooding is the most basic and easiest method of routing, as it requires no knowledge of the network topology at all. The basic principle of flooding is no route will be discovered or computed. A packet is broadcast to all nodes on a network with the expectation that at least one copy of the packet will reach the destination node. Under a light traffic load, flooding can be Page 25 reasonable robust. However, as one can imagine, the more nodes on a network and the more traffic that is sent, flooding has difficulty reaching any reliability or efficiency. [27] 2.4.4 Routing Overheads To provide a method of measuring the performance of a routing protocol in the scope of this research, this section will go into detail defining what routing overheads are, and what routing overheads are a good form of measuring the performance of a protocol on a network (i.e. metrics). An application or protocol, which transfers data across a network, cannot expect to use the full bandwidth of the communications medium. Along with the application’s data, the communications protocols transmit information of their own which is referred to as ‘overhead’. [28] The following section will go into detail of commonly discussed and researched metrics of routing performance measurements as well as the influences on routing overhead in mobile ad hoc networks. 2.4.4.1 Routing Overheads – Metrics This section is dedicated to the metrics that can be used as performance measurements of routing algorithms. Each of these metrics are commonly discussed in other research of MANET overheads. Routing Message Overhead Routing message overhead is calculated as the total number of control packets that have been transmitted. An increase in the amount of routing message packets that have been transmitted across a network will reduce the performance of an ad hoc network as it consumes portions of available bandwidth from the network. [29] This makes the routing message overhead a very good performance measure of routing overhead. Page 26 Average End to End Delay A network’s end-to-end delay is defined as the time interval between the generation and the successful delivery of data packets for all nodes in a network. This end to end delay can be a very good measurement of network performance as it gives an idea of how well structured the network is and the efficiency/performance that the routing algorithm has in reducing the latency of a packet being sent across the network. Throughput A network’s need to end throughput is a measurement of the networks successful transmission rate. It is usually defined as the number of data packets that have been successfully delivered to their final destination per unit of time. This is another very useful form of measuring the performances of a routing protocol as throughput can be used to determine the data that the routing algorithm itself is using on a particular link of the network at any given time t. This allows a thorough check of the impact of just the routing algorithm on its own, as well as the impact the routing algorithm may have with other traffic on the network. [30] 2.4.4.2 Routing Overheads – Influences This section is dedicated to the network variables that have an influence on the routing overheads and the metrics described above. Each of these variables is commonly discussed in other research of MANET overheads. [31] Number of Nodes The first of the influences is the number of nodes on a network. This can have an effect on how routing overheads are within a MANET due to the amount of route request packets that are flooded on a network. The more nodes will have an effect on how many of these packets flood the network. [32] Page 27 Link Speed Link speed has a direct relation with routing overheads due to bottlenecks on the network. A very low link speed does not allow a lot of traffic through, thus creating a larger bottleneck in the flood of packets on the network. [33] Movement/Routing Exposure The frequency of movement and topology changes within the network also can affect the performance of a network. [34] This should be seen as a major overhead within a network, as the network topology change will require the recalculation of all nodes within the network, consuming resources and requiring reconvergence of the routing protocol. Traffic Loads According to [35] the traffic load increase may have either a negative or a positive impact on the routing overhead. Dependent on the routing protocol, the overhead actually decreased with an increase in traffic load. This makes a good influence to be tested when analysing the metrics of particular routing algorithm. Summary Routes Route summarization can be described as the shortening of subnet masks to include several smaller networks into one larger network address. As the network grows larger, the number of individual networks listed in the IP route table becomes too big for routers to handle effectively. They get slower, drop packets and even crash. Summary Routes are therefore desirable for efficient routing of a large amount of routes on a network. [36] 2.4.5 OSPF on Ad Hoc Networks/MANETs Now that all of the basics of networking, OSPF, ad hoc networking as well as routing algorithm limitations, metrics and influences have been explained this section will go into detail finding any previous works of a link state routing algorithm such as OSPF on ad hoc/MANETs. It can be established that there have already been many papers with partial or introduced OSPF routing to ad Page 28 hoc networking [37] [38] [39]. Some of these developments try and tackle the difficult task of implementing a structured/link state routing algorithm on an ad hoc network with either no testing or varying degrees of success. It is important to note that there are many complications with an implementation of OSPF on ad hoc/mobile ad hoc networks. We have discussed a lot of these in the previous section(s). While there are many compelling reasons to not use OSPF on an ad hoc network (such as the problem of dynamic topologies with proactive routing explained in Section 2.4.3.2), there are also many compelling reasons as outlined in [37]. OSPF has a very robust backing as it has been around for well over a decade. The convergence time of OSPF is also relatively quick and it is a fairly lightweight routing protocol when comparing to other link state technologies. OSPF is also a very well known industry wide routing protocol. This availability and proven backing gives very promising future in industry and the use of (mobile) ad hoc networks more frequently. OSPF offers great integration of multi-hop wireless networking in the existing infrastructure, and seamless unification of wired and wireless IP networking under a single routing solution. This gives a further incentive in regards to flexibility, maintenance and costs. [40] Each of the papers researched have a uniform requirement of any possible extensions to having an OSPF solution running on an ad hoc network. Each paper [38][39] calls for interoperability. This should allow the protocol to support wire line networks as well as wireless in the case of a ‘plug in’. The second common motivation for OSPF to have a MANET extension is the support and the widespread support of the routing algorithm. This allows a strong basis of experience and skills from which to work on. A well known protocol can be extended rather than developed from scratch. One of the most compelling extensions to OSFP comes in the form of an Experimental RFC 5614. This RFC goes into detail describing the initial issues with OSPF regarding scaling and flooding operation of the routing algorithm. There is also interesting information uncovered in regards to the Designated Router election policy (see Section 2.4.2) not being able to converge in all scenarios. The Page 29 protocol is officially known as OSPF-MDR (OSPF-MANET Designated Routers). The key differences and extensions that this modified OSPF routing algorithm make is the utilization of DRs/BDRs feature of OSPF and treating the DRs as a default gateway. [41] The inter-area node is referred to as the MANET Designated Router (MDR), along with a backup DR known as the BMDR. The MDR is responsible for flooding LSA packets, via gathering adjacencies formed, to form the whole network topology. To further help reduce routing overheads, the MDRs can be declared as a non-flooding MDR to reduce LSA updates (see Section 2.4.4.1). A further extension to help combat routing overhead is in the adjacency formation process of OSPF. The normal process in OSFP utilizes hello packets when forming adjacencies with neighbour nodes. The extension provided in OSPF-MDR differentiates the neighbour relationships with adjacent nodes. This influences whether the node is routable/full connectivity is plausible between the nodes. The neighbourhood relationships include Down, One-Way, Dependent, Selected Advertised (included in LSA) and Bidirectional. [41] The OSPF-MDR extension shows lots of potential, but lacks in any further development, testing and use in the real world. Anything beyond theoretical and experimental development has yet to be done. Page 30 2.5 Battlefield Variables and Limitations of Communications There is a need to understand the tactical operating environment in order to appreciate the characteristics in deploying robust communication networks in the field. There are many key challenges with setting up a network in certain environments, and battlefield variables and limitations host one of the most difficult environments to successfully set up a tactical network abroad. The following section will cover the common fall-backs to the tactical battlefield operating environment in respect to setting up a communications network. 2.5.1 Limited Bandwidth and Latency The bandwidth of a tactical communication network is dependant on what the communication media can support. If the most stringent communication media is adopted, there is a need to endure that the network configuration is able to support required applications with a low data rate. There are a number of factors that need to be taken into consideration, especially with the kinds of data sent across the network to reduce overhead and up keeping a reliable and usable connection of nodes. [5] 2.5.2 Intermittent Communication Links Due to the high mobility of tactical nodes, communication links may be broken due to terrain masking. Networked nodes may therefore appear online and offline intermittently, indicating that the communication links are unstable and unreliable. [5] This is one of the key issues that will need to be dealt with at the routing and application layers in a network. This will be further described later in the literature review. 2.5.3 Hidden Nodes The hidden node problem is one of the most common issues with wireless/mobile ad hoc networks. The basis of the hidden node problem can be seen in Figure 1 below. Page 31 Figure 2 - Hidden Node Problem [3] If node A wants to transmit data to node B, by only sensing the medium, node A will not be able to hear transmissions by any node in the greyed area (in this case node C). Node A will therefore start transmitting, leading to collisions at node B. [3] This requires collision avoidance mechanisms such as using a random carrier sensing timer before data transmission and capturing uni-directional communications can help to overcome the hidden node problem. [4] Page 32 2.6 Network Simulation Tools In the area of networking, it can be very costly to deploy a complete test bed containing multiple networked computers, devices, routers and data links just to validate, verify and/or evaluate a certain network protocol or network design. It is thus in the interest of network engineers and researchers alike to find another medium to perform tests and evaluations on without stepping up to the full scale network implementation just for testing purposes. The solution comes in the form of network simulators. Network simulators are used in these circumstances and save a lot of time and money in accomplishing these tasks. [42] The following section will go into detail in describing what a network simulation tool provides, and a review of the current most prevalent tools available on the market today; namely, NS2/NS3 and OPNET. 2.6.1 What is a Network Simulation Tool? A network simulation tools is an application that allows the technique of implementing a network within a computer software package. Through this platform, the behaviour of the network is calculated either by network entities interconnection through mathematical formulas, or by capturing and playing back observations from a production network. [43] Network simulators allow researchers to simulate and design networks/protocols from their own computer and give accurate results that should be relatable and reflected if those parameters are used in the real world. This gives a much cheaper alternative when testing networks of great complexity, large environmental challenges, and/or protocols/applications in early stages of development. [42] Network simulation tools range from complex to simple as well as open source to commercial. Page 33 2.6.1.1 Commercial and Open Source Simulators Some network simulators are commercially available products. That means that the source code of those software packages is not available to the public. Open source network simulation tools on the other hand are completely available to the public for free use. Their source code is available to anyone and there are no limitations to the expansions or use of the source code. However, each type of simulator comes with its share of advantages and disadvantages. When looking at an advantage of a commercial simulator, the advantage is that it generally has complete and up-to-date documentation, which is consistently maintained by specialised staff within the development company. When comparing this to an open source approach, the open source solution can come as a disadvantage due to not enough specialised people working on the documentation of the software. The problem can be made even more prevalent when new versions of the software come out and there is a lack of documentation of the changes made due to difficult to trace code without any previous documentation. [43] That being said, the open source network simulator has an advantage in the respect that everything is open and available so that anyone/any organisation can contribute to the application and find bugs in it/make changes to improve it. It can also be far more flexible and easy to develop on regarding new technologies than commercially available software. [43] 2.6.1.2 Simple versus Complex Simulators There are lots of network simulators available currently both on the market commercially, as well as online and open source. Minimally, a network simulator should enable users to represent a network topology, define the scenarios, specifying nodes on the network, the links between those nodes and the traffic between those nodes. More complex system may allow the user to further specify everything about the protocols used to process network traffic, in depth device configuration, and sometimes even the ability to specify and define customized device and/or protocols/applications on the network. Page 34 Network simulation tools can be further separated into being either graphical or text based. Graphical applications allow their users to visualise the workings of their simulated network environment, while text based applications give less visuals/no visuals of the workings of the network. [42] 2.6.2 Network Simulator 2 and 3 Network Simulator (NS) is one of the most commonly and well-known simulation tools when it comes to networking research. It is an open source network simulator that has its origins in the REAL network simulator. The first version of NS was developed in 1989 and has evolved a lot over the past few years. NS2 is by far the most developed and used version, with many academic papers using NS2 as the simulation test bed. There have been lots of extensions to NS2, with support for a multitude of networking technologies, protocols and devices. Network Simulator is an object-oriented, discrete event driven network simulator that uses C++ and OTcl (Tcl script language with Object-oriented extensions developed at MIT). Network Simulator has proven efficiency with the backend of its C++ allowing for ultimate efficiency in simulation scenarios due to the separation of control path implementations from the data path implementations. That said, while NS2/3 are very efficient platforms to simulate a network upon, they are very difficult to easily change parameters and initiate a large-scale network topology due to the fact all events and devices need to be hand coded. There are extensions for a graphical interface to interact with the tool, but due to the nature of C++, a graphical interface is very primitive, buggy and does not allow a lot of much needed options for setting up a complex network. [44] 2.6.3 OPNET Simulator OPNET is one of the most common and popular commercially available network simulation tools available. Because of how long the simulator has been around and its use in the industry, it has developed a very good reputation, support base and market share. OPNET has a specialised software environment developed specifically for networking research and development. OPNET provides the Page 35 user with a powerful GUI and tremendous support for networking devices and protocols. This makes OPNET one of the most comprehensive and complete networking tools available to this date. The tool is split into three main functions; modelling, simulating and analysis. As stated before, for modelling it provides a powerful and complete GUI allowing the user to graphically create a network topology of their desire. [45] For simulating, OPNET uses three different advanced simulation technologies and can be used to address a wide range of studies. Lastly, analysis is the collation of all the data from simulated scenarios on the system and presented intuitively and graphically to the user in graphical or tabulated formats. Page 36 2.7 Conclusion In conclusion to the literature review, the concepts of military structure, the importance of Army rankings and environmental variables in the battlefield were covered in the first section. We find that whilst the army is a structured organisation, the working conditions and environments may require restructure and give a strong element of unpredictability. The concepts of networking and structured networks have been outlined in Section 2.2 and 2.3. Whilst structured networks are desirable for perfect environmental situations where by there are next to no variables limiting network infrastructure, ad hoc networks are certainly more desirable when it comes to limiting environments and unpredictable situations. In regards to the military’s use, MANETs are certainly desirable due to the flexibility, highly mobile nature and the ease of configuration MANETs offer. Routing is one of the most important elements of networking. Routing is the backbone of all networking communications. It determines what packets of data go where, allowing the connection between devices in wide area networks. While MANETs have an inherent advantage in complicated environments, they have difficulty supporting a routing algorithm that will maintain reliability and efficiency across the network. OSPF is one of the most prevalent, used and mature routing protocols available today. It has many features and benefits that would be desirable for use on a MANET. As found in literature, routing overheads caused by flooding is one of the most prevalent issues with OSPF, but little formal testing has been performed using OSPF in a military MANET environment. There have been plenty of suggestions in the form of RFCs in extending OSPF for better use on a MANET, but none have been tested to determine the real overhead of OSPF in such an environment. Network simulators are one of the best ways to test complicated network topologies and technologies in a cheap and accurate manner. There have been no accounted tests using either real world implementation or network simulation of OSPF on a MANET of limited environmental and device circumstances. Page 37 Due to this gap in the research, the proposed research question is “Can OSPF be used to efficiently support a military MANET under limited conditions such as low bandwidth, high drop outs, and unit mobility?” Page 38 Chapter 3 – Methodology In Chapter 2 it was shown that the use of OSPF in military MANETs has been avoided due to concerns with the routing protocol’s performance and reliability on ad hoc networks. However, the use of custom routing protocols for ad hoc networks is also difficult to implement due to their lack of formal implementation and/or testing. As such the research question in thesis is as follows: “Can OSPF be used to efficiently support a military MANET under limited conditions such as low bandwidth, high drop outs, and unit mobility?” To address this question the following research method will be applied. The chapter is structured as follows. The commonly used mythologies will be firstly covered to determine the best approach for this type of research. The Research Strategy/System development section of the methodology will outline the method of developing topologies from common military structures that will most accurately represent the said structures in a mobile ad hoc network environment. The Research Validation/Evaluation section of the methodology will outline what occurred with the simulation. This includes the configuration of the simulations parameters and what parameters will need to be extracted and evaluated upon. Page 39 3.1 Commonly used Methodologies in Research The methodology that will be used in this chapter to address the research question is based on previous work by Crnkovic [46]. He suggests that a question is first chosen regarding the research, and then a result is extracted via a particular strategy and validation technique. For each stage he suggests five different types of research questions, which have been summarised in Table 1. An example of a type of question that is being proposed is “Does X exist and what is it?” A strategy is then selected to provide an answer to the question. In this case it could be any of the five as seen in the middle column of Table 1. The final stage is selecting a validation technique to verify the results from the strategy stage. The selected validation technique relies on the strategy used. Page 40 Table 1 - A research methodology suggested by Crnkovic [46] Question Strategy/Result Validation Qualitative model Feasibility Report interesting Persuasion Does X exist and what is it? observations I thought hard about this, and I Is it possible to do X at all? Generalise from examples believe . . . Structure a problem area Characterisation Technique What are the characteristics of Invent new ways to do some X? Implementation tasks, including What exactly do we mean by Here is a prototype of a system implementation techniques X? that . . Develop ways to select from What are the varieties of X and alternatives how are they related? Method/means System How can we do X? Embody result in a system Evaluation What is a better way to do X? using the system both for Given these criteria, the object How can we automate doing insight and as a carrier of rates as . . X? results Generalisation Empirical model Analysis Is X always true of Y? Develop empirical predictive Given the facts, here are the Given X, what will Y be? models from observed data consequences Selection Analytic model Experience How do I decide whether X or Develop structural models that Y? permit formal analysis Report on use in practise Page 41 In this research, the methodology has been separated into two sections as per Crnkovic’s model. Referring back to Table 1, the chosen best fit for the question posed is Feasibility. The next step is choosing a strategy of best fit from the second column of the table. In this case, the best fit is System. This is due to there being no reliable findings in the literature that directs us further to results according to the posed question of the possibility of OSPF running on a MANET. Lastly, as the Validation stage relates directly to the Strategy/Results the chosen Validation is Evaluation. This includes the evaluation of some form of model or test from a built system to determine whether or not OSPF will run on a military MANET. The following Table 2 will accurately reflect the research methodology that has been adapted from Crnkovic’s model, with the Question, Strategy/Result and Validation sections relevant to this research. Table 2 - Adapted Research Methodology Question Strategy/Result Validation System Evaluation Develop a system that will Assess the outputs from the accurately represent a military Feasibility system upon running each of MANET environment. “Can OSPF be used to the cases and scenarios. Develop network cases and efficiently support a military Conclude using the scenarios to represent the MANET under limited performance metrics of OSPF military’s use on such a conditions such as low to confirm whether OSPF is a MANET system. bandwidth, high drop outs, viable routing protocol for use Run OSPF on this system and and unit mobility?” on a military MANET. these cases/scenarios and gather the outputs of the performance metrics of OSPF. Page 42 3.2 Research Strategy - System We need establish a method of gaining meaningful results that will allow us to confirm whether OSPF will work on a military MANET. The first step in the Strategy/Result phase of the methodology will require a means of developing a system upon which the theory can be tested in answering the initial question. This strategy phase can be broken down into a multitude of steps as outlined in the following section. 3.2.1 Understanding Hierarchy Military Structure This phase of the methodology required a thorough investigation of the military structure to gain understanding into the type of system that would be developed and engineered to best fit the application of a MANET in the field of battle. This extensive research will be undertaken through open discussions with DST Group staff member who present the most relevant, up-to-date, and used communication structures. The desired output of this activity is a series of military standard (MILSTD) drawings that accurately represent the communications network and structure of the military personnel/units associated with the network at hand. 3.2.2 Developing Network Topologies The next phase of the Strategy part of the methodology will require network topologies to be developed as a commencement of the network systems development phase. These network topologies will be developed to accurately represent the outcome of the previous stage, with close interactions with the DST Group to ensure that each topology is accurate to the real world communication network scenario. The development of these network topologies will also require the specific rules of OSPF to be adhered to. A simple example of a Network Topology is a basic network comprising of three routers connected via Ethernet running OSPF as a routing protocol. Page 43 Figure 3 – A Basic Network Topology 3.2.3 Developing Network Scenarios The next phase of the Strategy part of the methodology is the development of network scenarios. Each of the network scenarios are required to be designed to run upon the topologies developed in the previous phase. The scenarios are also required to accurately show the significant situations that these military MANETs will experience to test the effectiveness of OSPF as a routing protocol. These situations will be developed closely with the DST Group as per requested to ensure the situations being represented are accurate to those that the MANETs will experience in the field during operation. A simple example of a Network Case for the previously explained basic network topology in Figure 3 is a case where one of the routers links fail to the other router. In this case we could suggest the link between R1 to R3 failing. Page 44 3.3 Research Validation - Evaluation The second main section of the methodology for this research is in the Validation phase. As in Table 1, it has been chosen to develop a System for the Strategy/Result phase. This leads directly into the Validation phase of Evaluation. Evaluation can be extracted as ‘Given these criteria, the object rates as…’ This can be further converted for use in the case of this research as the phase of evaluating the network cases and scenarios to determine the overall impact of OSFP on such a system. For this evaluation to occur, the following steps are taken. 3.3.1 Network Topologies and Cases to a System This step requires the developed network cases to be run on networks that have been setup as according to the network topologies/systems as previously described. The method of setup of these networks will be covered in more detail in the further on. The desired outcome of this step is successfully converting the topologies and cases to a system to evaluate upon. Once the cases and topologies have been successfully converted a system, the inputs will be determined for the system as follows. 3.3.2 Determine Inputs for the System This step of the Evaluation phase requires the determination of the inputs for the system prior to running these simulations. These inputs will need to be consistent across all network topologies and scenarios, as they will be compared to each other. Inputs may include failure models to determine how OSPF reacts to a node dropping out, or packet size and rate, link speeds and connections, device types and setups, as well as possible simulated traffic on the network. The desired outcome of this step is determining all of the hard line requirement variables that will be run on each scenario and topology. 3.3.3 Determine Outputs (metrics) of System The next step of the Evaluation phase requires the determination of the outputs of the system after running the simulations. These are the metrics that we desire to use to evaluate the actual Page 45 performance of the OSPF routing protocol. This was previously touched on in Section 2.4.4. Each of these metrics will be used for all of the topologies and cases of the system. The desired outcome of this step is having a conclusive set of metrics that will accurately be used to represent the performance of the OSPF routing algorithm. 3.3.4 Make Predictions and run Simulations This step of the evaluation phase requires the previous knowledge of the OSPF routing algorithm and making predictions of the protocols effect to being run on such a topology and scenario. These predictions will be recorded and then the simulations run. The desired outcome of this phase is recorded predictions for the cases and scenarios inputted to the system, as well as simulation being run and results recorded and collated. 3.3.5 Draw conclusions from Outputs The last step of the Evaluation phase is analysing the results from the determined metrics. Once these results have been compared against all of the other case/topology results, conclusions will be drawn and predications made against the conclusive evidence given in the outputs. Page 46 3.4 Research Method to Use This kind of research falls into the category of modelling the behaviour of a network, specifically modelling the behaviour of a military mobile ad-hoc network when an OSPF network routing algorithm is used within it. There are two main methods to modelling network behaviour, mainly full-scale implantation and full system simulation. The following section will briefly explain each method of network behaviour modelling and the term ‘Network Behaviour’ itself. 3.4.1 Network Behaviour Network behaviour is the set of observations or measurements that can be made about a network over time (t). The growth of network-based computing and the Internet have ensured that networks can no longer be considered in isolation, as events external to a particular network increasingly impact its behaviour. This set of observations or measures help further understand the impact certain elements have on a network. In this case, we will be determining the impact OSPF has on a network type (MANETS) that does not normally utilize OSPF as its routing protocol. Conclusions can then be made whether or not OSPF is a likely candidate for use on military MANETs. 3.4.2 Full System Implementation Full-scale implementation is the means of designing and implementing a network of the specifications required at a full scale in the real world using physical hardware and data links. The full-scale network in this case would directly represent the network that would be utilized out in the field. This network would utilize all of the devices and connection as per required and requested by the client. This includes the physical, data link and network layers (cabling and wireless interfaces, etc.) as well as the transport, session, presentation and application layers as described in Chapter 2.2.1. The network would then be put through a series of ‘tests’ or ‘cases’ that move traffic throughout the network in a means that represents how said traffic will move around the network in the field over a time frame similar or the same as used in the field. The network traffic, devices, and data links are then analysed by means of network analysis tools such as Wireshark. [47] Through the Page 47 analysis stage the data is put into meaningful results such as graphs and tables to be easily analysed and compared to other cases. This method has its share of advantages and disadvantages. The major advantages being the simulation will be nearly 100% accurate provided it is setup and used exactly as it would be in the real world. The output of said implementation will also provide complete and accurate results for analysis purposes. With the tests being run over the same period of time using the same methods of usage as in the field, the results will directly provide all details associated with OSPF performance, as well as all other network variables (dropouts due to environmental changes, device failures, network stability, etc.) throughout the simulation. The obvious disadvantage to this kind of network behaviour modelling is the cost. Both time and money wise, this method of analysis is very expensive. The costs are very out of reach for this particular research, and the client itself. As there is not a lot of current research and analysis on running ‘off the shelf’ OSPF on a MANET, this method would also be a very risky financial gamble. If the said implementation does work, much of the work can be easily transferred to the real work implementation as the analysis and research is undertaken on a full-scale scenario. If said implementation does not work, the full-scale implementation designed solely around the setup of OSPF on a MANET would be virtually unusable for both future research and fieldwork. 3.4.3 Full System Simulation Full system simulation is the means of designing and implementing a network of the specifications required on a network simulation tool using simulated devices and data links. The network simulation would also directly represent the network that would be utilized in the field, but has the advantage of not physically requiring setting up. This network simulation should also utilize all of the network devices and technologies (such as routing protocols) as required by the network specification, provided the network simulation tool in use supports them. Similarly to the Full System Implementation, the network simulation tool would allow us to run the simulated network through a Page 48 series of ‘tests’ or ‘cases’. These tests will move traffic/nodes throughout the network as per required in the specifications. The network simulation tool records all of the traffic, link and device information as required within the tool itself. The data can then be meaningfully analysed through graphs and tables at the end of the simulation. Again, this method has its own share of advantages and disadvantages. The key advantages being the cost factor. Using a network simulation tool is much cheaper than setting up an entire network as the only initial outlay is the network simulation tool itself. The time factor is also greatly reduced, in comparison to setting up physical devices across a physical landscape. Another advantage is provided the network simulation tool is trusted and has strong backing/proved accuracy; the results yielded from said application are truthful to the real world figures. Obviously with such strong advantages, there is also a share of disadvantages. The main disadvantage being the fact that it is a simulation, which does not have a guaranteed accuracy to a real world scenario. While the accuracy may be out, the simulation will provide meaningful results to the scale and accuracy required for this research. Another disadvantage is in the support for devices and network technologies. The simulation software needs to provide all of the libraries and models for real world devices and network technologies such as routing algorithms and network traffic simulation. The key factor that needs to be fulfilled when using a network simulation tool is choosing the right one. This ties in all of the statements above including finding a good quality simulation tool that has a strong support and trust backing it, a support for all required devices and network technologies, as well as a tool that has the ability to output the required data for analysis. Page 49 3.5 Network Simulation Tools The only tool that will be utilized throughout this research is OPNET Network Simulator. Each of the network simulators that is available for use is further described in 2.5. OPNET Network Simulator is the best-fit tool for this kind of analysis. The simulator has a very intuitive and easy method of inputting network topologies, which is beneficial with the amount of topologies, and cases that will be used. OPNET was also chosen as it supports all of the routing protocols required including their full feature set. This means the simulations will best represent the real world cases as required by the client. OPNET is also the easiest solution to adopt, as there is no need to learn complex algorithms and programming languages. All of the devices and other applications such as VOIP are also available in OPNET Network Simulator. This will also give a better fit from simulation to a real world implementation. OPNET also integrates all of the data gathering and analysis in a simple and intuitive way to interpret and compare with other scenarios/cases. Page 50 3.6 Summary In Chapter 3 it was revealed the initial gap in the literature regarding the use of the OSPF routing protocol upon a military MANET. This lead onto the research question being formed, “Can OSPF be used to efficiently support a military MANET under limited conditions such as low bandwidth, high drop outs, and unit mobility?”. The research methodology was then determined via a means of ‘bestfit’ in reference to Crnkovic’s research methodology. From this a Feasibility, System and Evaluation methodology was extracted and interpreted for use in answering the initial research question. The methodology determined the development of a System to assess the performance of the OSPF routing protocol on a military MANET as if it were in the real world military environment the best Strategy in answering the research question. This means the OSPF routing protocol is run on a network simulator throughout a series of cases and scenarios to best represent that of a real world military MANET in the corresponding environment. The evaluation phase of the methodology would be in extracting the routing overheads/costs of the OSPF on military MANETs to determine whether the usage of such a routing algorithm would be feasible in the real world. Now that the research question and methodology of research has been outlined in Chapter 3, Chapter 4 – Simulation Design will commence on the Strategy/Result phase of the methodology. Page 51 Chapter 4 – Simulation Design The following chapter will go into detail of how the network topology and technologies such as OSPF can be accurately adapted and utilized in such an environment. This will require firstly going into detail of what a military structure/organization consists of. This includes the overall structure, as well as the hierarchical connections that each of the soldiers have to connect and communicate with other levels of the organization. It is important to use the correct terminology and symbology as briefed by the DST Group. Once the theory of the structure has been concreted, the concepts of network topologies will be touched on. This will include the main differences between both structured and dynamic network topologies. Moving on from this comparison we will tie in all of the learning’s of military structure and network topologies to represent these organizations and structures in a network topology, which can then be utilized for simulation purposes. Page 52 4.1 Military Structure To accurately represent a network of military nodes on a network topology we are first given the task of identifying the structure and organization of the military where the communication technology will be utilized. This is a required phase of the research, as a network topology cannot be setup without knowing the key factors such as type of equipment that the network needs, the capabilities of the equipment, the growth and structure of the network, as well as the way the network is managed. Military rankings can be identified into a multitude of different elements of command. These elements of command are also known as ‘units’. Each unit includes a different name to identify themselves, as well as different purpose, structure and size. Each of these elements are key factors in knowing how to describe a scenario in a network topology. Below are a list and a basic overview of the chain of command common in a military structure. The following list has been adapted from the United States Army Chain of Command, incorporating key elements and details given by the Australian Defence, Science and Technology Group adhering to MILSTD 2525B. [48] Fire Team A fire team (also known as a Brick) consists of 2 to 4 soldiers. A fire team is a very mobile unit in the structure. They are required to be mobile from other elements of the Section and Platoon as they are sniper/assault teams on the ground. Section A section/squad typically contains 8 to 10 soldiers and is commanded by a sergeant or staff sergeant. This is the smallest element in the Army structure and sits at the bottom of the hierarchy. Page 53 Platoon A platoon typically consists of 30 to 40 soldiers. It is also known as a Troop and is a culmination of 3 to 4 Sections. Company A company has alias names including Combat Team (CT) or Squadron/Battery. A company is the next level up from a Platoon and typically consists of ~120 soldiers. As with the hierarchical structure of the military, this is usually a culmination of 3 to 5 platoons. For this research we are under the assumption that each Company contains exactly 3 Platoons as given by the DST Group. Battalion A Battalion (also known as a Battle group (BG) or Regiment) usually consists of ~700 soldiers. Typically, 4 to 6 companies make up a battalion. For this research we are under the assumption that a Battalion consists of 3 Companies. Brigade A Brigade (also known as a Task Force (TF)) consists of ~4500 soldiers. This is normally made up from three battalions. This is the highest element in the military structure for the scope of this research. 4.1.1 Military Symbols Military structure is best and accurately represented via diagrams. Diagrams when explaining military organization are best shown using MILSTD 2525B. [48] This is a standard that has been devised over the years and is the internationally recognized standard for representing military structure diagrammatically. This section will first go into the explanation of the required military symbols for this research and their meanings, then go into an overview of the military structure that we will be dealing with. Page 54 Figure 4 – Military Symbols from Axis and Allies Wiki [49] The Figure 4 above shows the diagrams of each of the hierarchical elements as described in the previous section. This can be further clarified and condensed in the following Table 3. Page 55 Table 3 - Military Symbols (Detailed) Hyphenated Name BDE BN Symbol Size Alias Brigade 4500 Task Force (TF) Battalion ~700 Battle group (GB)/Regiment COY Company 120 Combat Team (CT), Squadron/Battery PL Platoon 30-40 Troop SECT Section 8-10 Squad FT Fire team 2-4 Brick Page 56 Figure 5 - US Army Hierarchy Military Structure [50] The above Figure 5 accurately represents the military structure that we are dealing with, given in an overall hierarchical view. For the purpose of this research we will only be dealing up to the Battalion level as pre requested by the DST Group. Lastly, the Platforms will be described in the following Table 4. These will only be used to identify what kind of platforms are in in each of the hierarchical elements in section 4.3.1. Page 57 Table 4 - Military Platforms Identification Name Soldier Soldier Sig Vehicle Vehicle CP (dismounted) (dismounted) ID A B C D Description Single Radio 2 Radios or Dual 3 Radios 5 Radios VHF – UHF Channel Radio Single Channel Page 58 4.2 Network Topologies The following section is provided to give a basic overview of network topologies before we go into detail in converting the military structure into a set of network topologies that can be used to accurately represent and simulate upon. Network topologies are utilized to layout the connection of devices on a network. They act as a visual aid in how a network will be planned out prior to its implementation. There are many standard network topologies currently in use in the industry. Each of these network topologies will be briefly explained to further help understand the design and possible limitations when representing a military MANET using conventional networking tools and protocols. 4.2.1 Structured Topologies Structured network topologies are the most commonplace for use in the industry. They can be easily identified for a particular network’s purpose and adapted for use using one or a combination of the following topology concepts. There are 5 basic types of network topologies as follows: Figure 6 – Network Topology Categories [51] Page 59 Bus Where a single cable (the backbone) functions as a shared communication medium upon which all devices attach or tap into with an interface connector. Ring Every device has exactly two neighbours for communication purposes. All messages travel through a ring in the same direction. Star Star uses a central connection point called a ‘hub node’ that may be a network hub, switch or router. Hierarchical/Tree Tree Topologies integrate multiple star topologies together on a bus. This can be represented in a hierarchical structure where the top node represent the main router, and each of the nodes below represent the main router for each of the nodes of a department, etc. Mesh Concept of routes. Messages sent on a mesh network can take any of several possible paths from source to destination. Terrific for redundancy purposes. From the given descriptions and explanations we can identify the most valid and purposeful topologies by relating back to the previous section on military structure. As the military structure most relates to the hierarchical/tree network topology concept we will be utilizing this as the basis development topology of the simulation networks. It is also important to relate the given requirements by the DST GROUP to these network topology concepts. Importantly, we will be utilizing elements of the mesh network topology concept to represent the redundancy requirement as given by the DST GROUP. Page 60 4.2.2 Dynamic Topologies and the Limitations of Structure To the following section will describe dynamic network topologies and how they can be utilized for the mobility concept requirement. As the DST GROUP have provided a requirement for soldiers apart of Platoons to be completely mobile between other platoons in the Battalion, another concept needs to be defined to answer this requirement. That concept is Dynamic Networks and the difference they have to structured topologies. The main conceptual difference between Structured and Dynamic networks is that networks that are dynamic have a topology that can change over time. Nodes and or edges may come and go. In comparison, a structured network is typically concrete and does not change over the lifespan of the network. This will not entirely suit the MANET requirements, as mobility and environmental changes are key concepts and the defining features that makes them a valuable asset and fit to the military. 4.2.3 OSPF and Network Structure It is important at this point to recognise that while OSPF is a dynamic routing protocol, it is usually utilized in structured and Local Area Networks as setup in a ‘normal’ network environment such as an office or a school. OSPF shines in its ability to recognize dropouts and other network issues and rectifying them via dynamic routing in a quick and efficient manner (as described earlier). OSPF therefore would not typically be thought of as being applicable for such a dynamic and environmental challenging environment such as that of a military ad hoc network. That said, there are many reasons that OSPF should be utilized and is conceptually a good fit for this application. As a proactive link-state routing protocol, OSPF employs periodic exchanges of control messages to accomplish topology discovery and maintenance. Packets called Hellos are exchanged locally between neighbour routers to establish bidirectional links, while other packets called LSAs reporting the current states of these links are flooded throughout the entire network. This signalling will result in a topology map that is present in each node on the network. This makes the use of Page 61 OSPF on MANETs a very interesting avenue of research as the routing algorithm’s concept provides itself to be dynamic enough that it will update as changes occur on the MANET. [52] That said there are some limitations that we need to consider prior to developing these simulation network topologies that will run and utilize OSPF. Some of these limitations are in the way OSPF is required to be setup. As previously mentioned, OSPF uses flooding to exchange link-state updates between routers. Any change in link state information is flooded to all routers in the network. Areas are a technique used to introduce borders on the explosion of link state updates. As the requirements of the network are low-bandwidth, we will need to consider the use of areas and border routers in the network design. This needs to be taken into consideration as the main rule when setting up areas is that all routers need to be connected (in some capacity) directly to the router that is area 0 (the main exchange). As we have defined the military organizational structure as being best suited to a hierarchical network topology, there will be some limitations and possible adaption of another routing algorithm in the case that the one of the routers (nodes) are not connected directly to the area 0 router. This can be shown in the following diagram (Figure 7) where RIP and BGP are utilized on said routers. Figure 7 –RIP and BGP on Routers Topology [53] Page 62 Possible solutions to such a network design include the use of Virtual Links and/or another routing algorithm such as RIP or BPG on the routers that are not physically connected to Area 0. The design decisions will be further outlined in the next sub section 4.3. Page 63 4.3 Representation of Military Structure as a Network Topology/Scenarios The following section will go through all of the design decisions that were made in representing the military structure as a network topology to represent the MANETs that will be analysed for the simulation. This chapter cover the ideology and creation behind developing the network topologies and scenarios that will be used to simulate, and analyse once transformed into OPNET Simulator. For the purpose of this paper, the only cases and topologies that will be covered are the main analysed scenarios; the test cases will not be covered in this paper. 4.3.1 Requirements Provided At this point it is important to concrete some of the requirements provided by the DST GROUP before coming up with the test cases for the simulation. The requirements stated by the DST GROUP include: Two connections between each hierarchical element (ie. PL to CO, etc) for redundancy purposes. Each of the simulations includes all of the soldier nodes represented using provided amount and structures for each unit/element. Solider mobility is represented (allowing soldiers to freely move between different platoons). OSPF is utilized on ALL network cases as a means of measuring the routing overheads on network simulations best developed to represent the structure of the military MANETs. 4.3.2 Defining Military Organization This section will go into detail describing the diagrams that were devised throughout multiple meetings with DST Group. Each of the diagrams will be described with details that were also given throughout the meetings in regards to details that may not be directly included on the diagrams themselves. Page 64 The structure of the following section will go from top-level diagrams down to the bottom level that will be dealt with in developing network topologies and cases. 4.3.2.1 Top Level MOT BN The following diagram is the top-level overview of the military organisation that will be using the MANET system. Figure 8 - MOT BN The above Figure 8 represents the overall view of the motorized battalion network that will be utilizing the MANET. The Battalion network is the highest level that we will be focusing on. Each of the links to other elements of the military organisation is represented by the links going from one NET to another. At this stage it is important to note a few things that will be detrimental to the development of network topologies and network cases. Firstly, it is important to note that there are always two links between the company network and the battalion network. These two links are there purely for redundancy purposes. The amount of soldiers internal to the network at this level is Page 65 ~700. It is also important to note that a Battalion network includes three Company networks as can be seen by COYA, COYB and COYC. The next level of the military organisation that we will focus on is the Company level. Page 66 4.3.2.2 MOT COY The following diagram is the next level down the chain of command in the military network hierarchy. This diagram represents the Company networks connected to the Battalion network. Figure 9 - MOT COY Structure The diagram shown above (Figure 9) is in MILSTD 2525B. [48] This diagram is used to see both the structure of the company network, but also where each soldier grouping is located within the network. In this case, we can see the COY network is made up from ~120 soldiers. Figure 10 - MOT COY Overview Page 67 Figure 10 represents the company network, but in an overview view. This allows the viewing of each of the links to the network as the hierarchy ranks up. It is important to note at this level that the initial requirements are adhered to, of only two links between the ranks. Therefore, only 2 links will be utilized between the Platoon network and the Company network / Company to Battalion, not the 3 or 4 shown in this diagram. It is also important to note at this stage that the internal workings of each of the networks does not need to be known for the purpose of this research. Lastly it is important to note that each Company level includes three Platoons. Page 68 4.3.2.3 PL NET The following diagrams represent the next level down in the chain of command in the military network hierarchy. In this case, we will focus on the lowest level that will be overlooked in this research, the Platoon level. Figure 11 - INF PL The diagram above is also in MILSTD 2525B. [48] This diagram is best used to represent the internal structure of the Platoon network. While in the focus of this research we do not need to focus on the internal workings of each level hierarchy, it is important to note the amount of overall soldiers in each network. In this case, there are ~30-40 troops in each PL. Page 69 Figure 12 - Dismount PL Network As can be seen in Figure 12, the overall view of the Company and Platoon network is shown. It is important to note in this diagram the SIG connection between the PL and the COY Net. This SIG actually represents two links by SIG soldiers within the PL network. As in the requirements, these SIG soldiers represent the dual link redundancy connection for each Platoon to the above hierarchy. Each of the SECT networks below the Platoon Network are not required in the scale and/or scope of this research and can be ignored as the soldier count at each network level compensates for these lower level entities. Page 70 4.3.3 Converting to Network Topologies The following section will go into detail in the conversion process and design decisions of transforming the military diagrams into the System phase of the proposal. This section will only be covering the main cases that were used to extract relevant results from. Test cases will be ignored for the scope of this paper. The levels will be done from the bottom up for sake of simplicity (i.e. starting at the bottom level [Platoon Level] and working up to the top level [Battalion Level]). 4.3.3.1 INF Platoon Network The INF Platoon will be represented by two separate networking topologies. This will allow a more detailed analysis on at the Platoon/Company level prior to stepping up to a full-scale model that includes the Battalion network. This design decision was made in conjunction with the DST Group as the full-scale implementation includes ~700 nodes. The first topology that will be represented is the more detailed topology at the Platoon and Company level. Figure 13 - Platoon/Company Detailed Case Page 71 As can be seen in Figure 13, there are only 5 soldiers in total. These soldiers are connected to two Platoon networks respectively. Each of those Platoon networks is then connected to the Company networks above. The reason this topology is developed on a much smaller scale than a standard platoon network (~30-40 soldiers) is this topology was developed as an initial test of mobility. The small scale of the topology allows us to easily move soldiers between Platoon networks. This comes as a design decision of OPNET and the DST Group. The DST Group requested an example that allowed an element of mobility. OPNET enabled this via a Failure model on the links. This allows the links of soldiers to be failed and restored at time any time ‘t’ throughout the duration of a simulation, thus, inducing a method of mobility. Figure 14 – Full Scale PL Network Topology Figure 13 above shows the simple Platoon network topology. This network topology was decided as the simple representation of a platoon network as it only includes two physical nodes. This design decision came after a meeting with the DST Group. It was determined that the internal structure of the networks was not necessary in a full-scale implementation of the MANET, therefore only the requested number of soldiers needed representation. The complete representation of ~30-40 soldiers at this level is not required by 30-40 separate nodes, thus the design decision of the use of Loopback interfaces is used. Page 72 4.3.3.2 Company Level Network The company level network topology will again be represented by two separate network topologies. Please refer to section ‘4.3.3.1 Platoon Level Network’ for information about the design decisions regarding the conversion of the Platoon/Company Detailed Case as per Figure 13. The full-scale CO level network topology can be represented as follows. Figure 15 - Full Scale CO Network Topology This topology was developed to most accurately represent the Company level network. This topology (Figure 15) shows each of the three Platoon networks. These networks are connected via dual link SIG Soldiers as per requirements. The dual link SIG Soldiers are also used in the connection to the Battalion network as required. The design decision was made to have a ‘HUB’ router that acts as the main router for the Company. This decision came in conjunction with the DST Group, as the internal network structure did not matter, so long as each solider was accurately represented and the dual link requirement was retained. This design decision also provides a debugging mechanism to check routing tables and make sure the network is performing correctly. Page 73 4.3.3.3 Battalion Network The overall Battalion network will be represented by only one network topology. This is due to the large scale of the implementation of such a network (~700 soldiers at this level). The Battalion network is setup similarly to the full scale Company network as can be seen in Figure 16 below. Figure 16 - Full Scale Battalion Network Topology As can be seen, this topology was developed with all design requirements adhered to. The dual links to the CO level networks are retained. The design decision to have a HUB router to control all routes at this level was made to ensure the correct routes were being relayed throughout the network via means of debugging with IP routing tables. It is important at this stage to note a key design decision with the full-scale network topology. The use of network Areas has been made when running OSPF across the network. This is to help divide the network into the separate Company/Platoon networks. As this design decision was made, the separation of the network needed to be determined. As each of the Areas needs to touch Area 0 (See Literature Review – Chapter 2), the design decision was made to separate the network into Areas 1,2,3 respectively, between the BN and each of the CO Networks. This created an issue regarding the Platoon networks though, as if they were to run OSPF, they would not be touching Area 0 without a method of virtual links. The design decision was made Page 74 to use RIP Routing protocol between the Platoon Networks and the Company Networks to alleviate the need for Virtual Links, and retain the use of OSPF Areas. 4.3.4 Developing Network Cases The developments of network cases that will be run upon the topologies are outlined in Chapter 5 – Simulations. Page 75 4.4 Determine Inputs for the System This section is covered in Chapter 5 – Simulations. This information along with the Development of Network Cases has been explained at the beginning of each Scenario for clarity of information regarding each case. Page 76 4.5 Determine Outputs (metrics) for the System Each of the cases that will be run on the network simulation tool on the network topologies developed will need to have a standardized set of information extracted and analysed for the results to be meaningful and comparable. The following section will cover what information will required extraction from the network simulation tool logs to give conclusive evidence regarding whether or not OSPF is viable on military MANETs. To show whether or not OSPF is a viable solution for military MANETs, the overhead and throughput will be the main focus points of the data collection and analysis. The following headings represent the data that will be extracted from the simulations. Each of these includes a brief explanation as to what the data means and why it was chosen for extraction. 4.5.1 IP Forwarding Tables IP forwarding tables (also known as Routing Tables) are a table that is used to display the routes a router on a network has. This gives a terrific insight when analysing a network as it shows at any given point in time what a particular router may or may not have access to. The reason this is particularly interesting for concluding whether or not OSPF can be used on a MANET is that OSPF controls how the routing table will react in specific cases as it is the routing algorithm for the network simulations. This is vital in knowing OSPF’s reaction to cases such as network dropouts, or mobility, etc. 4.5.2 OSPF Traffic OSPF Traffic is usually measured in a data per second rate. OSPF traffic represents the amount of traffic (data packets) at a particular point in time that is being sent or received by the OSPF protocol in particular. As one of the main features of the MANET is low bandwidth devices and links, this will be vital information in debunking whether or not OSPF is even viable with the bandwidth capabilities of the links, and devices in question. Page 77 4.5.3 Point to Point Throughput Point to point throughput is usually measure in a data per second rate. Point to point throughout is measured on a particular link in a network topology. It represents the amount of traffic (data packets) at a particular point in time that is being sent or received over the chosen link in the network. Again, as one of the main features of a MANET is mobility and low bandwidth, it needs to be determined whether or not there is too much traffic over a link that exceeds those of the requirements of the MANET. Page 78 4.6 Summary The end goal for Chapter 4 was the development of network topologies and cases/scenarios to best represent the military MANETs in the expected environments. The chapter went into detail in revealing the important aspects of the military structure and organisation that the MANETs in question will be utilized for. It was revealed that the military utilize a very hierarchical ranking system when organising soldiers and officers in a field of battle. This is crucial information in developing topologies and cases to best represent the MANETs. Another important theory that was covered was the development of network topologies. The different kinds of network topologies were revealed and explained. The best-fit topologies were then chosen as bases for the development of the MANET topologies. Finally, the learning’s of military structure, network topologies as well as information gathered from meetings with the DST Group were utilized in the development of network topologies and cases/scenarios that can be inputted to a simulation system. This leads directly onto the next chapter, Chapter 5 – Simulations. The developed topologies and scenarios are now inputted into network simulation software to run and evaluate the result of running the OSPF routing protocol upon said network topologies and scenarios. Page 79 Chapter 5 – Simulations The following chapter will cover the network topologies and cases/scenarios that were developed in the previous Chapter 4 - Simulation Design as they are run and evaluated via the network simulation software OPNET Network Simulator. This chapter covers the last portion of the Strategy/Result as well as the Evaluation phase of the methodology covered in Chapter 3 – Methodology. Each of the cases/scenarios has been separated into Simulation Phases. Each phase represents a grouping of network topologies/cases/scenarios that are suited towards the same comparative study. The following chapter is structured into splitting each of these Phases, and then each of the cases internal to that phase. Each case will then be explained, prediction of the results of OSPF’s behaviour on the network, the results themselves in graphical and tabulated form, and finally an explanation of the results given. Page 80 5.1 Simulation Phases The following section will go into detail of the separate phases of the simulations that were undertaken to best represent the military MANETs associated with the military structure that will be utilized out in the battlefield. As explained in the Chapter 5 introduction, phases are a compilation of network topologies/cases/scenarios that are suited towards the same comparative study. This means that a phase represents the same network topology/design, but with a number of different cases/scenarios run upon it then compared in the results. There are some important keywords that may come up in this section that refer to specific features of the OPNET Network Simulating Tool. They are as follows. Application Definition – allows us to specify any applications that we wish to simulate traffic over the network. Profile Definition – Allows us to specify details on how the applications as defined in Application Definition will be utilized throughout the simulation. Failure Recovery – Allows us to specify failures on the network that happen throughout the simulation. This includes things such as nodes going down, links breaking, etc. Please note that Phase 1 has been left out of this document as these are ‘test’ cases and do not impact the results/help in answering the research question. The ‘test’ cases and network topologies developed in this Phase were solely for use by the DST Group as the initial cases in assessing the OPNET Network Simulation software. However, the insight gained by this ‘Phase 1’ research was that there is no impact on the results OPNET Network Simulator produced regardless of link speeds throughout the network. Therefore, the following simulations utilized 10Mbit/sec link speeds rather than the required 2-5Kbit/sec links, as there is no impact on results. Page 81 5.1.1 Phase 2 The following topology represents the topology of the basic setup of 5 soldiers connected to two separate platoon networks (see Figure 17). Those Platoon networks are then connected to the above level Company networks as represented by the top-level routers. *Note the crosses on the links represent the current failed links. This simulates SO1, SO3 and SO5 being a part of PL1 and SO2, SO4 being a part of PL2. Each of the IP addresses used in the simulation setup is also provided below in Table 5. Page 82 IF1 IF1 IF1 IF6 IF2 IF3 IF4 IF5 IF6 IF1 IF2 IF1 IF2 IF1 IF2 IF1 IF2 IF1 IF2 Figure 17 - Phase 2 Overall Topology Page 83 IF1 IF2 IF3 IF4 IF5 Table 5 - Phase 2 IP Table Device CO1 Area 3 Interface IP Address Subnet Mask IF1 192.168.6.1 /30 LB0 192.168.7.1 /30 CO2 3 IF1 192.168.5.1 /30 LB0 192.168.8.1 /30 PL1 1 IF1 192.168.6.2 /30 IF2 192.168.1.2 /30 IF3 192.168.1.6 /30 IF4 192.168.1.10 /30 IF5 192.168.1.14 /30 IF6 192.168.1.18 /30 PL2 2 IF1 192.168.2.2 /30 IF2 192.168.2.6 /30 IF3 192.168.2.10 /30 IF4 192.168.2.14 /30 IF5 192.168.2.18 /30 IF6 192.168.5.2 /30 SO1 1 IF1 192.168.1.1 /30 IF2 192.168.2.1 /30 SO2 2 IF1 192.168.1.5 /30 IF2 192.168.2.5 /30 SO3 1 IF1 192.168.1.9 /30 IF2 192.168.2.9 /30 SO4 2 IF1 192.168.1.13 /30 IF2 192.168.2.13 /30 SO5 1 IF1 192.168.1.17 /30 IF2 192.168.2.17 /30 As seen in the above Table 5, each of the physical sides of the network are separated into Areas; respectfully, Area 1, Area 2 and Area 3. The basis of the simulation was to setup each of the soldiers to advertise their network as an OSPF route to their respective PL gateway. Note: Both CO routers have a Loopback interface setup for simulation of traffic out to the COs and beyond from the SO level. Each of the simulations was performed over a 600 second (10min) span. Page 84 The above Figure shows the base OSPF Timer configurations. It is also important to note that 10Mbit links were utilized throughout the simulation. These configurations were left as default, as they are the default OSPF configurations in the real world. This ensures an accurate representation of real world OSPF performance. 5.1.1.1 Case 1 – No Summary Route, No Routing Exposure within PL MANET The initial case was developed with the intention of getting a base line figure for OSPF routing overhead on this particular network topology. This means that there will be no elements that give OSPF a lower bandwidth consumption (i.e. creating the maximum amount of routing overhead for this case). For this reason the decision to run the simulation with no summary route and no routing exposure was made. For the definition of Summary Route and Routing Exposure please refer to Chapter 2, Section 2.4.4.2. Upon running this simulation, the confirmation of the correct adding of routes needs to be checked via means of the outputted IP forwarding table for both CO and PL networks. To confirm whether or not the routing has been setup correctly, we will confirm in each CO and PL routing table that only the 192.168.1.x SOs and 2.x SOs for each area (1 or 2) should be visible in these tables. This is a prediction that comes with the end result of the IP forwarding table to ensure the correct addition of routes. Page 85 5.1.1.2 Case 2A – No Summary Route, Routing Exposure within PL MANET For this case we will be again using the exact same topology as before, but this time we will be simulating exposure by moving SOs between PL networks. Namely for this simulation, we initially have all soldiers connected to PL1, and will be moving SO3 and SO5 from PL1 to PL2 by means of disconnecting and connecting links between those respective SOs and the designated PL networks. We will be performing this via the Failure Recovery object of OPNET. We will be initially disabling all links between all SOs to PL2. At 300 sec (1/2 time simulation) we will disable links PL1->SO3 and PL1->SO5, then at 400 seconds (to give time for movement) we will recover the links PL2->SO3 and PL2->SO5. This simulates the movement of SO3 and SO5 from PL1 to PL2, given 100 seconds of down time for both nodes. The topology diagram is given below for initial setup. Again all of the links and nodes have OSPF setup on them, using standard 10Mbit Ethernet links as before. Figure 18 - Case 2A Topology Page 86 5.1.1.3 Case 2B – Address Summarization, No Routing Exposure in PL MANET For this case we are still using the same topology as both previous cases. This relates more to Case 1 except with Summary Routes set up on both PL1 and PL2. Note both CO1, CO2 and the lower level PL networks are on separate networks to allow Area Summarization to occur. Initially you will see that SO1, SO3, and SO5 are connected to PL1 network, and SO2 and SO4 are connected to PL2 network. This simulation is setup to determine the difference in OSPF traffic load when using area summarization versus performance as in previous cases with no summarization and all routes being advertised. Figure 19 - Case 2B Topology Page 87 5.1.1.4 Case 2C – Address Summarization, Routing Exposure within PL MANET For this scenario we are simulating an extension on the case 2A and 2B where we are using Address Summarization and Routing Exposure within the MANET to show Traffic Loss when SOs switch between PL networks. As before, the routing topology remains the same and can be seen as follows with the included traffic flows: Figure 20 - Case 2C Topology Page 88 Please refer to Case 2A for OSPF Traffic Sent/Received/Point to Point Throughput as the Results are identical. 5.1.2 Phase 3 The following section will outline the final large-scale topology of the MANET field simulation. The following simulation is done at the BN level which includes the vicinity of ~700 SOs on the network. This is the first simulation performed that utilizes sub networking features of OPNET Simulator. As previous simulations, all other configurations have been adhered to with the time limit remaining at 10minutes for the simulation. OSPF Efficiency has been disabled as previously, as well as RIP Efficiency for this example. The simulation does not factor into account the configuration within each of the networks as previously described in Section 4.3. In this simulation each of the SOs within the PL networks have been simulated via Loopback interfaces in a 10.x.y.z IP configuration for simple traceability. This will be outlined further in the topology diagrams and explanations as follows. Figure 21 - Top Level Topology Page 89 The above diagram (Figure 21) shows the top level topology. As can be seen there are two links from the BN to each of the CO networks for redundancy purposes as outlined in the proposal. Each of these links are currently operating at 10Mbps, but can be easily scaled for simulating the bottlenecking of the OSPF and RIP routing protocol analysis. It is also important to note at this stage all of the links utilized are OSPF between the BN network and the corresponding CO networks. Each of the COs operate in their own Areas that correspond to the number identifier of the CO networks. I.e.) CO1 is in Area 1, CO2 is in Area 2, etc. BN network is in Area 0. Each CO includes 3 PL networks, each with 30 soldiers. Figure 22 - BN Sub Network Topology The above diagram (Figure 22) represents the internal BN network topology. This shows the BN_HUB and the routers that connect the BN network via twin links to each of the CO networks. Again, at this level, each of the links are OSPF. It is also important to note that the Area change over occurs between the ABR routers internal to the BN network to each of the COs. In this case, toCOx_y will handle the intra-area linking. Page 90 Figure 23 - CO Sub Network Topology The above Figure 23 represents the internal CO network topology. As can be seen, similarly to the BN sub network there is a HUB router that handles all of the routing between the three internal PLs and the BN network. There are still two links configured between routers and the PL networks for redundancy purposes. It is also important at this stage to note that ALL links below the toPLx_SOy are OSPF and all that are above are handled with RIP Routing as specified in the proposal. Page 91 Figure 24 - PL Sub Network Topology OSPF Base Parameters Figure 25 - OSPF Configuration, Phase 3 The above Figure 25 shows the base OSPF Timer configurations. **It is also important to note that 10Mbit links were utilized throughout the simulation. Page 92 Finally, the above diagram (Figure 24) represents the internal PL network topology. Please ignore the messy links off of the SOs; this is just a bug in OPNET Simulator when dealing with single nodes inside a sub network. Each of the SOs includes 15 loopback interfaces on them to simulate 30 soldiers within each of the PL networks. The IP configuration of these loopback interfaces has been configured as follows for easy traceability: 10.x.y.z x = CO network y = PL network z = SO number It is also important at this stage to note that all of the interfaces between routers of sub networks have been left to auto assignment via OPNET. Therefore the IP configurations have been assigned by OPNET for simplicity of design as well as the design not needing specific IP configuration between all of the interfaces. 5.1.2.1 Case 1 – No Link Fails, Full Connectivity The following case represents a full connectivity scenario with no link failures. This will not show any redundancy working as none of the links will fail between the respective PLs, COs and/or BN. For the following case we will trace the IP Forwarding Tables in BN, CO1 and PL1 up the network tree. As this case will have no link failures, we can assume that the tables will correspond for each of the other COs and PLs. 5.1.2.2 Case 2 – Link Failures at PL > CO and CO > BN Level The following case represents the scenario that a link failure should occur at each sub network layer level. In this case we will be simulating the failure of links between PL1 and CO1, and then CO1 to BN. This failure simulation is handled on the same graphs as used in the previous case. Page 93 ** The link failure between PL1 and CO1 on the toPL1_SO1 > SO1 connection will occur exactly 180 seconds into the simulation. ** The link failure between CO1 and BN on the toBN1 > toCO1_1 will occur exactly 300 seconds into the simulation. All configurations have been sustained in regards to IPs and Routing; thus the previous tables in Case 1 can be utilized for this case. Page 94 5.2 Simulation Results The following section will go through the explanations of the simulation results as described by the cases in Section 5.1. 5.2.1 Phase 2 This section will go through the results of Phase 2 of the simulation results. Please refer back to the corresponding description of the cases in Section 5.1 for a reminder of each case and scenario. 5.2.1.1 Case 1 – No Summary Route, No Routing Exposure within PL MANET To confirm the correct adding of routes, we will check the IP forwarding table for both CO and PL networks. To confirm whether or not the routing has been setup correctly, we will confirm in each CO and PL routing table that only the 192.168.1.x SOs and 2.x SOs for each area (1 or 2) should be visible in the following tables 6, 7, 8 and 9. Table 6 - PL1 IP Forwarding Table Table 7 - CO1 IP Forwarding Table Page 95 Table 8 - PL2 IP Forwarding Table Table 9 - CO2 IP Forwarding Table Expectations Next we will investigate the impact of OSPF traffic on the network. We are expecting a bottleneck at the beginning, then a smooth out gradually over time t after convergence. This bottleneck we are expecting is an assumption due to the influx of OSPF hello packets that will flood the network after initial boot up. This flood will provide the initial routing convergence of the network (Network Discovery – See Chapter 2). Once OSPF has converged, we expect the activity to settle back down. Page 96 OSPF Traffic Sent (bits/sec) for CO1, CO2, PL1, PL2 Page 97 OSPF Traffic Received (bits/sec) for CO1, CO2, PL1 and PL2 Page 98 Point to Point Throughput between PL1<->CO1 and PL2<->CO2 (bits/sec) Page 99 5.2.1.1 Phase 2 - Case 1 Results Explained As expected, the first case results show the initial convergence of OSPF in all graphs. The traffic sent in the first graph (p. 96) shows the peak at ~2500bits/sec by the PL1 router. While this peak is very high, it does not yet debunk the hypothesis of this research. The peaks are still below the threshold given in the requirements. That being said, this was a base case for the second Phase with only 5 soldiers on the network. The assumption is made that scaling up higher will do fairly detrimental things to the network. It is also important to note that in all cases, once convergence happened, the stable ~200-300 bits/sec activities still leaves plenty of room for applications thus far. 5.2.1.2 Case 2A – No Summary Route, Routing Exposure within PL MANET Table 10 - IP Forwarding Table of CO1 @ time (200 sec) Table 11 - IP Forwarding Table of CO1 @ time (600 sec) For this case we are looking to make sure the desired result of the SOs 3 and 5 ‘move’ from the PL1 network to the PL2 network after the use of the Failure Model. As seen, each of the correctly configured SOs connected via PL1 have been propagated and accessible from CO1 router. Therefore, the IP Forwarding table of CO1 has been successfully Page 100 updated once links between SO3 and SO5 were lost via PL1 as shown in comparing Tables 10 and 11. We can now check the PL1 IP Forwarding Tables at the same time intervals to make sure at the next level down in the hierarchy (see Tables 12 and 13). Table 12 - IP Forwarding Table of PL1 @ time (200 sec) Table 13 - IP Forwarding Table of PL1 @ time (600 sec) As previously mentioned, the Direct links between the SOs is retained for those that still have connection; namely SO1, SO2 and SO4. Also note the loopback address of CO1 has correctly been picked up here as well. Page 101 Table 14 - IP Forwarding table of CO2 @ time (200 sec) Table 15 - IP Forwarding Table of CO2 @ time (600 sec) As can be seen in the above tables (Table 14 and Table 15), the OSPF entries for SO3 and SO5 were correctly added at the CO level approx. 5 and 10 seconds after the initial reconnection to PL2 @ 400sec into the simulation. We can now check over PL2s forwarding tables to see the full convergence of the SOs 3 and 5 across to PL2. We are expecting an initially empty table for PL2 at the 200 second interval, and then the appearance of the two direct links to SO3 and SO5 at the 600 second interval. Table 16 - IP Forwarding Table of PL2 @ time (200sec) Table 17 - IP Forwarding Table of PL2 @ time (600 sec) Page 102 Again, as previously mentioned, the SO3 and SO5 nodes were successfully picked up both at the 400second mark, exactly 100 seconds after disconnection with PL1 300 seconds into the simulation (see Tables 16 and 17). As can also be seen, the OSPF entry for the loopback @ CO2. ** While not included in full detail for all SO nodes we will show the IP Forwarding Table for SO1 as below in Table 18: Table 18 - SO1 IP Forwarding Table As can be seen, SO1 has the complete access to all required nodes on the network, as one would describe. In this instance of the simulation there is no link between the CO networks, but a simple addition of these links will also provide complete connectivity to all SOs on Area 2. For the purpose of this simulation we have provided the connectivity between nodes in the same areas; hence the access to only nodes in the 192.168.1.x range and the access to PL and CO networks on the same Area number. Expectations Similarly to the previous case, it is expected that there will be a great amount of initial convergence activity, particularly on the PL1 and CO1 routers. This is due to the initial connection of all SOs to only those two routers. It is also expected to see another peak on the graph at the 300 and 400 second mark due to the mobility of SOs 3 and 5 to PL2. This is also a good test of convergence activity for 5 soldiers to a single point of contact as soon as the network fires up. The convergence activity was nearly 2500 bits per second initially in the previous case. One would predict this to be even higher with the addition of two more nodes to the PL1 network upon initial convergence. Page 103 OSPF Traffic Sent (bits/sec) for CO1, CO2, PL1 and PL2 Page 104 OSPF Traffic Received (bits/sec) for CO1, CO2, PL1 and PL2 Page 105 Point to Point Throughput between PL1<->CO1 and PL2<->CO2 (bits/sec) Page 106 5.2.1.2 Case 2A – Results Explained As in the expectations, each of the graphs explains the initial predictions. There is a very large initial peak on PL1. This peak actually exceeds 6400 bits per second. This has already exceeded the given link speed requirement upon initial convergence. As predicted, the other routers on the network did not see any large initial convergence figures. PL1 also saw a peak of activity at the 300 second mark as predicted when the two SOs left the network. There is a slight break of activity after the convergence of the SOs leaving. Once the soldiers reconnected at the 400-second interval we again see convergence activity, this time on PL2 as predicted. This peak was unexpectedly high at nearly 2000 bits per second for convergence of only two routes. Page 107 5.2.1.3 Case 2B – Address Summarization, No Routing Exposure in PL MANET This case relates directly to Case 1, except it has been setup with address summarization to determine the impact that route summarization has on the overheads of OSPF. Table 19 - IP Forwarding Table of CO1 Table 20 -IP Forwarding Table of PL1 Table 21 - IP Forwarding Table of CO2 Table 22 - IP Forwarding Table of PL2 Page 108 As there is no mobility aspect to this case, the IP Forwarding tables have been shown (Tables 19 to 22) to confirm whether the correct SOs are connected to each of the PLs and whether or not the COs get these SOs correctly propagated up the chain of command. Expectations The expectations of this case are very similar to the Case 1. The key difference being the use of route summarization. One would expect that the routing convergence activity on the PL networks would remain almost identical, but there would be fewer loads on the CO convergence. Page 109 OSPF Traffic Sent (bits/sec) for CO1, CO2, PL1 and PL2 Page 110 OSPF Traffic Received (bits/sec) for CO1, CO2, PL1 and PL2 Page 111 Point to Point Throughput between PL1<->CO1 and PL2<->CO2 (bits/sec) Page 112 5.2.1.3 Case 2B – Results Explained As in the expectations, the results shown in the Case 2B graphs are nearly identical to that in Case 1. There is an ever so slight reduction in the OSPF traffic sent in the initial convergence, but this difference is within 100bits per second, making the difference almost negligible whether or not route summarization is used. Page 113 5.2.1.4 Case 2C – Address Summarization, Routing Exposure within PL MANET Expectations For this case, we expect the simulation lose traffic that is being sent from CO1 to SO3 and SO5 as there will be no connection to these soldiers once they have switched to the other PL network. The convergence figures we expect to remain the same, as previously proved there is no real difference between having address summarisation on. As the simulation is an extension of Case 2A and 2B, the results of convergence figures are expected to be the same as Case 2A. Results Please refer to Case 2A for OSPF Traffic Sent/Received/Point to Point Throughput as the Results are identical. The IP Ping Requests and Receives from CO1 to SO3/SO5 can be seen on the following page. Page 114 IP Ping Requests and Receives from CO1 to SO3/SO5 (Failed Nodes @ t=300sec) Page 115 5.2.1.4 Case 2C – Results Explained As can be observed, the ping requests failed at t=300 seconds because of the change within the MANET is not advertised beyond the PL level. It is important to note that the ping requests start at t=1sec into the simulation and do not get Received until ~62 seconds into the simulation as this is the time for OSPF Convergence. Page 116 5.2.2 Phase 3 5.2.2.1 Case 1 – No Link Fails, Full Connectivity The following IP Forwarding Tables have been included in this document as a reference back to the automatic configuration of IP Addresses in the full-scale scenario. This helps with the debugging process if one of the nodes is not connected properly to the network. It is also important to note that, as this is a full-scale implementation, the IP Forwarding tables may not be their full size as there are in excess of ~700 nodes on this network. Table 23 - CO1 > PL1 > SO1 IP Forwarding Table Table 24 - CO1 > PL1 > SO2 IP Forwarding Table Page 117 Table 25 - CO1 > CO1_HUB IP Forwarding Table It is important to note in IP Forwarding Table 25, the results of OPNET and its OSPF configuration advertising the entire interface IPs of every other router on the network. The IP Forwarding table is longer than the above snapshot, but it is just full of the IP addresses of the interfaces of redundancy connections between routers elsewhere in the network. Page 118 Table 26 - BN > BN_HUB IP Forwarding Table Again, similarly to the previous scenario with the CO1_HUB table (Table 25), we find that on the BN_HUB router, all of the 10.x.y.z addresses are there as we required, but so are the interfaces elsewhere on the network that have been advertised via the OSPF protocol throughout the network (see Table 26). Page 119 Expectations The expected results would have a dramatic OSPF convergence figure after the results of Phase 2. With the full scale (all nodes) on this network (confirmed in IP Forwarding Tables), the expected results are well in excess of the transmission rates on offer by the equipment. We also predict the resting network traffic almost being too high for other applications to run upon the network. Page 120 RIP Traffic Sent (bits/sec) for CO1 > PL1 > SO1 (same for all other SOs) Page 121 RIP Traffic Received (bits/sec) for CO1 > PL1 > SO1 (same for all other SOs) Page 122 OSPF Traffic Sent (bits/sec) for CO1_HUB, CO2_HUB, CO3_HUB Page 123 OSPF Traffic Received (bits/sec) for CO1_HUB, CO2_HUB, CO3_HUB Page 124 OSPF Traffic Sent (bits/sec) for BN_HUB Page 125 OSPF Traffic Received (bits/sec) for BN_HUB Page 126 5.2.2.1 Case 1 – Results Explained As predicted, the results of the OSPF Traffic across all main hub devices are higher than the capability of the devices they will run on. This confirms in the case of full connectivity, a network of this scale has a convergence that would bottleneck even a direct Ethernet connection. RIP routing results have also been added for completeness, but are not the focus of this research. As a side node, it is interesting to note that the RIP routing network consumption was relatively low, peaking at only ~59 bits per second. On the other hand, the lowest OSPF traffic was still in excess of 28,000 bits per second, making it unfeasible on even higher capacity networks. Page 127 5.2.2.2 Case 2 – Link Failures at PL > CO and CO > BN Level Again, the following IP Forwarding Tables have been included in this document as a reference back to the automatic configuration of IP Addresses in the full-scale scenario. This helps with the debugging process if one of the nodes is not connected properly to the network. It is also important to note that, as this is a full-scale implementation, the IP Forwarding tables may not be their full size as there are in excess of ~700 nodes on this network. Table 27 - PL1 > SO1 IP Forwarding Table Table 28 - CO1 > PL1 > SO2 IP Forwarding Table Page 128 Table 29 - CO1 > CO1_HUB IP Forwarding Table Page 129 Table 30 - BN > BN_HUB IP Forwarding Table Expectations The results that are expected are similar to the previous case, but with the element of link failure similar to in Phase 2. As previously shown, the convergence activity of just 2 nodes almost exceeded the capacity of the network, thus the convergence when ~30 nodes initially leave the network (when PL1s link fails from CO1 180 seconds into the simulation), then again when CO1s link fails at 300 seconds into the simulation. Page 130 RIP Traffic Sent (bits/sec) for CO1 > PL1 > SO1 Page 131 RIP Traffic Recieved (bits/sec) for CO1 > PL1 > SO1 Page 132 OSPF Traffic Sent (bits/sec) for CO1_HUB, CO2_HUB, CO3_HUB (ZOOMED) Page 133 OSPF Traffic Received (bits/sec) for CO1_HUB, CO2_HUB, CO3_HUB (ZOOMED) Page 134 OSPF Traffic Sent (bits/sec) for BN_HUB Page 135 OSPF Traffic Received (bits/sec) for BN_HUB Page 136 5.2.2.2 Case 2 – Results Explained As predicted in the Expectations, the convergence was the same at the beginning of the simulation (not shown due to zoomed in results to show convergence upon link failure). As shown in the graphs, the link failure sparked OSPF activity nearly in excess (PL1 disconnect) as well as in excess (CO1 disconnect) of the available bandwidth according to the requirements. It is also interesting to note the RIP traffic received by SO1 on CO1 drop off after the disconnection of PL1 as one would expect. Page 137 5.3 Summary of Simulation Results The results of the simulations have provided both reasonable and surprising results based upon past results and predictions of the OSPF protocol in certain situations. The OSPF routing protocol has much greater routing overheads than expected when placed in such a networking environment. Being a proactive routing protocol, it was not expected that OSPF would perform well in the MANET configuration. Routing overheads were much greater than anticipated upon initial convergence. Once the mobility model was introduced, the convergence numbers were again very high. There were many interesting points of discussion regarding each set of results when comparing them against the initial Routing Overheads in Chapter 2, Section 2.4.4.1 – Routing Overheads. One of the most prevalent proven factors of the Routing Overheads was the increase in number of nodes having a dramatic effect on both routing overhead during convergence and the network activity once convergence had occurred. In all cases, this was apparent, with an increase in number of nodes on the network having a proportional increase in the routing overhead of OSPF. Another interesting point that was proven came in the form of link speeds and the movement model having an impact on routing overheads. As discovered with the results, OPNET Simulator did not show the effect that reduced link speeds have in the simulation results. There was no impact in the results no matter what the link speeds were. This can be pinpointed to a design with the OPNET simulation software itself. The software was not designed to show the impact that link speeds have upon routing overheads, and will thus display the impact that OSPF/protocols/applications have themselves, rather than the effect it will have once the link bandwidth is exceeded. This can therefore be a point of further research and simulation. As stated before, the effect that the mobility model has on routing overheads is apparent, with the routing overhead increasing and becoming more prevalent (especially with convergence) in the cases that included a mobility model. Lastly, one of the most interesting factors that were actually proven to have no impact included the use of summary routes. This element of routing overhead influence did not have a detrimental effect Page 138 on the simulation results when it was used. It could therefore be concluded from this set of results that it has a negligible effect on OSPF routing overheads within a MANET. Finally, it is important to note that the increase in network complexity is obviously going to have an impact on the routing overheads of a protocol. This is a useful measurement of performance of the protocol in a situation such as a MANET. With the results that have been gathered for the use of OSPF on a military MANET, the support for other applications will be nearly impossible once the overheads and usability of the routing protocol has been compensated on the network. It is therefore conclusive that OSPF in its current form is not suitable for use on a military MANET as per requested. Page 139 Chapter 6 – Conclusions and Future Work Starting from the literature review, MANETS appear to be completely different from a typical structured network. MANETs require a lot more special attention prior to their setting up, as proven in the literature review. It is important to note that while MANETs do not normally perform as well as structured networks, their features and flexibility are desirable in certain fields due to their selfconfiguring nature, and low maintenance when compared to a structured network architecture. That being said, MANETs require a lot of thought and attention when deciding what routing protocol should be utilized upon the network. ‘Off the shelf’ routing algorithms such as OSPF and RIP pose as a viable candidates to use on a MANET mainly due to their widespread and knowledge around the globe. That being said, as proven in the literature review, theoretically they do not perform well on MANETs. This sparked the interest of the DST Group whom were looking at getting a comprehensive review of OSPF upon a military style MANET, as the topic had never been covered prior. One of the most challenging and interesting points when looking at the usage of a MANETs in comparison to a structured network is the utilization of end devices as the router. Routing overheads are therefore one of the main issues that will plague the entire network, as each end devices is essentially a ‘router’ of sorts. Since these end devices do not normally have the internals/structure or performance of a router, it is important to reduce these routing overheads to a minimum, to allow maximum network resources and processing power of the end devices to the applications that are required on said networks. One of the major routing overheads/concerns, as shown in the simulations was the size of the overall network, in which the size and complexity of the network had the greatest effect on routing overheads, and thus, performance of the network. Each of the influences covered in the literature review had a direct impact on the routing overheads of OSPF except for Link Speeds and Summary Routes. As discussed in the simulation results, this was due to Link Speeds not being a feature that impacted results of OPNET simulator, becoming a Page 140 software constraint. The other influence of Summary Routes was proven to have a negligible effect on simulation results. It can therefore be concluded, through the results gathered and analysed, that OSPF in its current ‘off the shelf’ form is not a viable solution for use on a military MANET. There are many aspects of the OSPF routing algorithm that concern the network performance due to high routing costs and overheads. The major of which is convergence, both upon initial setup of the network, but also in regards to the mobility model which is a detrimental requirement of a MANET. If full summarization is performed, full IP connectivity is ‘plausible’, but again, this comes with the loss of the mobility model, which is a detrimental requirement of MANETs. It is also revealed that the use of OSPF is viable in a network of a very low number of nodes without a mobility mode. This is however a detrimental requirement of a MANET. It can therefore be concluded that the off the shelf OSPF routing algorithm is not a viable routing protocol for use in military MANETs. Page 141 6.1 Future Work The state of this thesis is complete in regards to the thorough research and analysis of the affects of OSPF on a military style MANET. That being said, there are still elements to this thesis that can be further expanded upon. The main of which is the inclusion of other off the shelf routing algorithms such as RIP. This expansion to other off the shelf routing algorithms will allow further studies into finding a better fit, and possibly a protocol that performs well in its ‘off the shelf’ form. This can then be analysed and compared with the results of this and other research to determine other features and algorithms that best suit MANETS. Another lead for further works from this research is the inclusion of the communication and radio manufacturers that design and develop the devices that will be used out in the field of work where the MANETs are required. Working with these manufacturers will allow the simulations models to be further fine tuned to more accurately represent the real world scenarios and devices. The behaviour of said devices can be better interpreted and inputted to the simulation software to enhance the accuracy of results of OSPF running upon said end devices. Working with the device manufacturers will also give an insight into the inner working and technology platform within said end devices. This will allow another point of expansion for this research in finding a routing algorithm that best suits the devices. By working closely with the manufacturers of radio devices, the routing algorithms that best suit the workings and platforms of the devices can be discovered and fine-tuned to suit. Lastly, one of the key future works for this paper in particular, with the focus still on OSPF’s use in military MANETs, is the research of off the shelf OSPF adapted MANET routing protocols. As touched upon in the literature, OSPF-MDR is a MANET focused extension of OSPF. While the algorithm is still in experimental stages, the internal workings of the protocol can be adapted for use in simulation tools such as OPNET. This will act as a terrific comparison platform to the research that was undertaken in this paper. It will allow a direct comparison to the traditional OSPF protocol used in this document, but will also allow further fine-tuning and development of the OSPF-MDR algorithm. Page 142 6.2 Thesis Contribution 1. OSPF in a military MANET situation is unlikely to be viable with the mobility model. The viability for the use of the OSPF routing protocol in a military MANET situation has been proven to be an infeasible task given the set of specifications as per required. As revealed in Chapter 5, Section 5.2.1.2, it was proven that with the mobility model in place, the routing overheads of OSPF were far greater than expected upon the convergence of the re-entry of nodes into the network. With the requirements of a 2-5Kbit per second link, the routing overhead sits at nearly 2Kbit upon convergence, consuming most, if not all, of the available network resources. 2. With a low number of nodes (less than 5 soldiers), the use of RIP and/or OSPF might be a viable routing solution on a military MANET. As initially explained in Section 2.4.4.2, the number of nodes upon the network was revealed through literature to be a key factor in influencing routing overhead. This was proven in Section 5.2.1.1, where by the routing overhead of OSPF after the initial convergence was within acceptable range as per given in the requirements. The stable routing overhead sit well below the 2-5Kbit per second maximum network bandwidth, with room left for other applications upon the network. 3. OPNET Network Simulation model for military MANETs. Military style MANETs have been modelled and simulated through the use of the OPNET Network Simulator as shown in Chapter 4 – Simulation Design. It is important to note the development of the two main styles of network topologies to simulate different detail levels of a military MANET. Section 4.3.3.2 best reveals these two main styles regarding a full scale implementation (expected ~700 nodes on the MANET in total), as well as the lower level, more detailed topology of 5 nodes. 4. Expansion of the understanding of use of MANETS within the hierarchical structure of the Military and the use of the MANETS within this structure. Page 143 It has been revealed in Chapter 4 the development of network topologies and cases to best represent the structure and usage of military MANETs. This development required the expanded understanding of the use of MANETs within the military environment and structure. This understanding is revealed in Sections 4.1 for Military Structure, 4.2 for Network Topologies and combined in Section 4.3 whereby the development of network topologies and scenarios is undertaken. 5. Expand the understanding of the limitations of the OSPF routing algorithm. It has been revealed in the Chapter 6 the conclusive evidence that OSPF has a multitude of limitations impacting its use on military MANETs. It has been revealed that the major impacts regarding routing overheads for OSPF on a military network include number of nodes on the network, movement/routing exposure as well as traffic loads. This provided insight into the limitations whereby OSPF ‘falls down’ in regards to its use on a military MANET. Page 144 References [1] Duggan, T. (2015). The Advantages of Team-Based Structure. [online] Small Business Chron.com. Available at: http://smallbusiness.chron.com/advantages-teambased-structure55624.html [Accessed 1 Sep. 2015]. [2] Tsouras, P. (2005). The book of military quotations. St. Paul, MN, USA: Zenith Press, pp.160168. [3] Jayasuriya, Aruna, et al. Hidden vs exposed terminal problem in ad hoc networks. Diss. ATNAC 2004, 2004. [4] Chau, C., Chen, M. and Liew, S.C. 2009. Capacity of Large-Scale CSMA Wireless Networks. Paper presented at the Annual International Conference on Mobile Computing and Networking (MobiCom), Beijing, China, 20-25 September. [5] Cheung, L. Y., Chia, W. Y.: Designing tactical networks – Perspectives from a practitioner, DSTA Horizons, Tech. Rep., June 2013 [6] Bora, G., Bora, S., Singh, S. and Arsalan, S. (2014). OSI Reference Model: An Overview. International Journal of Computer Trends and Technology, 7(4), pp.214-218. [7] Winkleman, R. (2013). An Educators Guide to School Networks. [online] Fcit.usf.edu. Available at: http://fcit.usf.edu/network/default.htm [Accessed 10 Oct. 2015]. [8] Dipobagio, Martinus. "An Overview on Ad Hoc Networks." [9] Frodigh, Magnus, Per Johansson, and Peter Larsson. "Wireless ad hoc networking: the art of networking without a network." Ericsson Review 4.4 (2000): 249. [10]Bang, Ankur O., and Prabhakar L. Ramteke. "MANET: History, Challenges And Applications." International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2.9 (2013): 249-251. Page 145 [11]Kumar, Mohit, and Rashmi Mishra. "An Overview of MANET: History, Challenges and Applications." Indian Journal of Computer Science and Engineering (IJCSE) 3.1 (2012): 121125. [12]Ns1.silvernet.com, (2015). Wireless MESH Networks - SilverNet.com. [online] Available at: http://ns1.silvernet.com/solutions/Mesh-Networks.php [Accessed 6 Nov. 2015]. [13]Bakht, Humayun. "Applications of mobile ad-hoc networks." Research Seminar, School of Computing and Mathematical Sciences, Liverpool. 2005. [14]Pandey, Ashwini K., and Hiroshi Fujinoki. "Study of MANET routing protocols by GloMoSim simulator." International Journal of Network Management 15.6 (2005): 393-410. [15]Wu, Kui, and Janelle Harms. "QoS support in mobile ad hoc networks." Crossing Boundariesthe GSA Journal of University of Alberta 1.1 (2001): 92-106. [16]Yen, L. (n.d.). Mobile Ad Hoc Networks (MANETs). National University of Kaohsiung [17]Beal, V. (2015). What is Latency? Webopedia. [online] Webopedia.com. Available at: http://www.webopedia.com/TERM/L/latency.html [Accessed 12 Nov. 2015]. [18]Garg, Nishu, and R. P. Mahapatra. "Manet security issues." IJCSNS 9.8 (2009): 241. [19]Chapter 2 - Static Routing. (n.d.). 1st ed. [ebook] Scholar Store, pp.51-55. Available at: http://scholarstore.com/samples/3143.pdf [Accessed 22 Nov. 2015]. [20]Macfarlane, James. Network routing basics: Understanding IP routing in Cisco systems. John Wiley & Sons, 2006. [21]AR400 Series Router Software Reference for Version 2.9.1. (2007). Allied Telesis, Inc, pp.23-3 to 23-14. [22]CISCO Systems, Introduction to OSPF. (2006). ISP/IXP Workshops. [23]Arora, R. (2010). What is the difference between Broadcast and Point to Point Networks. [online] Data Communication Assignment. Available at: http://rishabhcs206.blogspot.com.au [Accessed 10 Nov. 2015]. Page 146 [24]Schluting, C. (2006). Networking 101: Understanding OSPF Routing. [online] Enterprise Networking Planet. Available at: http://www.enterprisenetworkingplanet.com/netsp/article.php/3610496/Networking-101Understanding-OSPF-Routing.htm [Accessed 14 Nov. 2015]. [25]Faloutsos, M. (n.d.). Introduction to Wireless Ad-Hoc Networks Routing. The University of California - Riverside [26]E. M. Royer and C.-K. Toh. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2): 46–55, April 1999. [27]Zou, Xukai, Byrav Ramamurthy, and Spyros Magliveras. "Routing techniques in wireless ad hoc networks classification and comparison." Proceedings of the Sixth World Multiconference on Systemics, Cybernetics and Informatics, SCI. 2002. [28]Cavanaugh, John David. "Protocol overhead in IP/ATM networks." Minnesota Supercomputer Center Technical Report, F19628-92-C-0072, Minneapolis, MN (1994). [29]T. H. Abd El-Nabi, "Modeling and Simulation of a Routing Protocol for Ad Hoc Networks Combining Queuing Network Anakysis and Ant Colony Algorithms", Phd Thesis, April 2005. [30]Radwan, A., Tarek M. Mahmoud, and Essam H. Houssein. "Performance measurement of some mobile ad hoc network routing protocols." IJCSI 8.1 (2011): 107-112. [31]Pandey, Kavita, and Abhishek Swaroop. "A comprehensive performance analysis of proactive, reactive and hybrid manets routing protocols." arXiv preprint arXiv:1112.5703 (2011). [32]Naserian, M., et al. (2005). Routing Overhead Analysis for Reactive Routing Protocols in Wireless Ad Hoc Networks, IEEE. [33]Gikaru, Wilfred Githuka. Mobility based routing overhead management in reconfigurable wireless ad hoc networks. Cuvillier Verlag, 2004. Page 147 [34]Subbarao, M. W. (1999). Ad Hoc Networking Critical Features and Performance Metrics. National Institute of Standards and Technology, Wireless Communications Technology Group: 11. [35]Sarkar, Subir Kumar. Wireless sensor and ad hoc networks under diversified network scenarios. Artech House, 2012. [36]Barker, K. and Valentine, M. (2014). Route Summarization | Cisco CCENT ICND1 100-101 Exam Cram: Concepts in IP Addressing | Pearson IT Certification. [online] Pearson IT Certification. Available at: http://www.pearsonitcertification.com/articles/article.aspx?p=2168927&seqNum=7 [Accessed 20 Nov. 2015]. [37]C ́edric Adjih, Emmanuel Baccelli, Philippe Jacquet. Link State Routing in Wireless Ad-Hoc Networks. [Research Report] RR-4874, INRIA. 2003. [38]RFC5614 | | Ogier, R. and P. Spagnolo, "Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding", RFC 5614, DOI 10.17487/RFC5614, August 2009, <http://www.rfc-editor.org/info/rfc5614>. [39]RFC5820 | | Roy, A., Ed., and M. Chandra, Ed., "Extensions to OSPF to Support Mobile Ad Hoc Networking", RFC 5820, DOI 10.17487/RFC5820, March 2010, <http://www.rfceditor.org/info/rfc5820>. [40]Du, Ning, Huijing Yang, and Chunying Wang. "An Optimized OSPF Routing Protocol for Mobile Ad-hoc Networks." Journal of Networks 7.9 (2012): 1456-1463. [41]James, Shakir. "OSPF Extensions for Mobile Ad-hoc Networks." Washington University in St. Louis (2008). [42]Pan, Jianli, and Raj Jain. "A survey of network simulation tools: Current status and future developments." Email: jp10@ cse. wustl. edu (2008). [43]Siraj, S., A. Gupta, and R. Badgujar. "Network simulation tools survey." International Journal of Advanced Research in Computer and Communication Engineering 1.4 (2012): 199-206. Page 148 [44]Plácido, R. (n.d.). Visual Network Simulator - A GUI to ns-2. [online] Apus.uma.pt. Available at: http://apus.uma.pt/vns/ [Accessed 27 Nov. 2015]. [45]Sarkar, Nurul I., and Syafnidar A. Halim. "A review of simulation of telecommunication networks: simulators, classification, comparison, methodologies, and recommendations." (2011). [46]Crnkovic, I., “Software Engineering and Science,” vol. 2003: Malardalen University, 2001. [47]Orebaugh, Angela, Gilbert Ramirez, and Jay Beale. Wireshark & Ethereal network protocol analyzer toolkit. Syngress, 2006. [48]Department of Defense (1999). Department of defense, interface standard, common warfighting symbology: MIL-STD-2525B. Washington DC: Department of Defense, Defense Information Systems Agency. Available at http://symbology.disa.mil/symbol/index.html. [49]Axis & Allies Wiki, (2015). Military Symbols. [online] Available at: http://axisandallies.wikia.com/wiki/Military_Symbols [Accessed 29 Nov. 2015]. [50]Olive-drab.com, (2015). U.S. Army Organization. [online] Available at: http://olivedrab.com/od_milorgs_us_army.php [Accessed 29 Nov. 2015]. [51]Sudarshansoftech.com, (n.d.). Computer H/W & Networking. [online] Available at: http://www.sudarshansoftech.com/chnt3.htm [Accessed 30 Nov. 2015]. [52]Baccelli, Emmanuel, Juan Antonio Cordero Fuertes, and Philippe Jacquet. "Ospf over multihop ad hoc wireless communications." International journal of Computer Networks & Communications 2.5 (2010): 37-56. [53]Cisco, (2005). OSPF Design Guide. [online] Available at: http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/70391.html#t8 [Accessed 29 Nov. 2015]. Page 149